{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T06:53:05Z","timestamp":1720335185702},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,7,31]],"date-time":"2013-07-31T00:00:00Z","timestamp":1375228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s11042-013-1592-8","type":"journal-article","created":{"date-parts":[[2013,7,30]],"date-time":"2013-07-30T12:00:04Z","timestamp":1375185604000},"page":"1291-1321","source":"Crossref","is-referenced-by-count":4,"title":["A robust multimedia authentication and restoration scheme in digital photography"],"prefix":"10.1007","volume":"73","author":[{"given":"Sidra","family":"Riaz","sequence":"first","affiliation":[]},{"given":"Sang-Woong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,31]]},"reference":[{"key":"1592_CR1","doi-asserted-by":"crossref","unstructured":"Ali Al-Haj M (2010) Two spatial watermarking techniques for digital images. In: Advance techniques in multimedia watermarking: image, video, and audio applications. IGI Global Snippet, ch. 1, pp. 2\u20135","DOI":"10.4018\/978-1-61520-903-3"},{"key":"1592_CR2","unstructured":"Ali H-M, Abdellatif M, Bourennane E-B (2011) A watermarking of medical image: method based \u201cLSB\u201d. In: Journal of Emerging Trends in Computing and Information Science, vol. 2, no. 12, December, pp. 714-721"},{"key":"1592_CR3","unstructured":"Alomari R-S, Al-Jaber A (2004) A fragile watermarking algorithm for content authentication. In: IEEE Trans. JCIS Journal of Computing and Information Science, vol. 2, no. 1, pp. 27\u201337"},{"key":"1592_CR4","doi-asserted-by":"crossref","unstructured":"Barnes C, Goldman D-B, Shechtman E, Finkelstein A (2011) The patchmatch randomized correspondence algorithm for structural image manipulation. In: Communication of the ACM, vol. 54, issue. 11, November, pp. 103\u2013111","DOI":"10.1145\/2018396.2018421"},{"key":"1592_CR5","doi-asserted-by":"crossref","unstructured":"Chamlawi R, Asifullah K, Adris I, Zahid M (2007) A secure semi-fragile watermarking scheme for authentication and recovery of image based on wavelet transform. In: Journal of Computer Science and Technology, vol. 2, no. 6, November, pp. 795\u2013804","DOI":"10.1007\/s11390-007-9103-x"},{"key":"1592_CR6","doi-asserted-by":"crossref","unstructured":"Chamlawi R, Asifullah K, Imran U (2010) Authentication and recovery of images using multiple watermarks. In: Computers & Electrical Engineering, vol. 36, issue. 3, May, pp. 578\u2013584","DOI":"10.1016\/j.compeleceng.2009.12.003"},{"key":"1592_CR7","doi-asserted-by":"crossref","unstructured":"Chamlawi R, Khan A, Idris A (2007) Wavelet based image authentication and recovery. In: Journal of Computer Science and Technology, vol. 22, no. 6, November, pp. 795\u2013804","DOI":"10.1007\/s11390-007-9103-x"},{"key":"1592_CR8","unstructured":"Christof P, Jan P (2010) Introduction to cryptography and data security. In: Understanding cryptography: a textbook for students and practitioners, reprint. Springer, Germany, ch. 1, sec. 1.1, pp. 2\u20134"},{"key":"1592_CR9","unstructured":"Chuan Q, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. In: Journal of Signal Processing, ACM, vol. 92, issue, 4, April, pp. 1137\u20131150"},{"key":"1592_CR10","doi-asserted-by":"crossref","unstructured":"Datta R, Joshi D, Li J, Wang J-Z (2006) Studying aesthetics in photographic images using computational approach. In: Proc. of European Conference on Computer Vision (ECCV), May, pp. 288\u2013301","DOI":"10.1007\/11744078_23"},{"key":"1592_CR11","doi-asserted-by":"crossref","unstructured":"Dobbertin H, Knudsen L, Robshaw M (2005) The cryptanalysis of the AES \u2013 a brief survey. In: Advanced encryption standard-AES. Springer, India, vol. 3373, ch. 1, sec. 2, pp. 1\u201310","DOI":"10.1007\/11506447_1"},{"key":"1592_CR12","doi-asserted-by":"crossref","unstructured":"Furht B, Kirovski D (2006) Protection of multimedia content in distribution networks. In: Multimedia watermarking techniques and applications. CRC Press, Taylor and Francis Groups, USA, ch. 1, pp. 1\u201360","DOI":"10.1201\/9781420013467.ch1"},{"key":"1592_CR13","unstructured":"Huang W, Ho T-SA, Pankajakshan V (2008) Watermarking-based content authentication of motion-JPEG sequences. In: Proc. of VIE visual information engineering. p. 813\u2013818"},{"key":"1592_CR14","unstructured":"Hung K-M, Chen T-W, Su W-K (2012) Automatic image authentication and recovery using multiple watermarks. In: ICIDT information science and digital content technology, vol. 3, June, pp. 730\u2013735"},{"key":"1592_CR15","unstructured":"Jeng-Shyang P, Hsiang-Cheh L, Jain LC (2004) Advanced watermarking techniques. In: Intelligent watermarking techniques, 4th ed. World Scientific, USA and London, UK, part 3, ch. 12-18, pp. 351\u2013515"},{"key":"1592_CR16","unstructured":"Li C-T, Lou D-C, Liu J-L (2003) Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem. In: Journal of Chinese Institute of Electrical Engineering, vol. 10, no. 1, pp. 99\u2013106"},{"key":"1592_CR17","unstructured":"Lin C-Y, Chang S-F (2000) Semi-fragile watermarking for authenticating JPEG visual content. In: Proc. of SPIE, security and watermarking of multimedia contents, vol. 2971, pp. 140\u2013151"},{"key":"1592_CR18","doi-asserted-by":"crossref","unstructured":"Lin ET, Podilchuk CI, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. In: Proc. of SPIE security and watermarking of multimedia contents, vol. 3971. San Jose, California, January, pp. 23\u201328","DOI":"10.1117\/12.384969"},{"key":"1592_CR19","doi-asserted-by":"crossref","unstructured":"LinP-L, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. In: Journal of Pattern Recognition, ELSEVIER, vol. 38, issue. 12, December, pp. 2519\u20132529","DOI":"10.1016\/j.patcog.2005.02.007"},{"key":"1592_CR20","unstructured":"Pan H-K, Chen Y-Y, Tseng Y-C (2000) A secure data hiding scheme for two-color images. In: Proc. of IEEE Symposium on Computers and Communications, pp. 750\u2013755"},{"key":"1592_CR21","doi-asserted-by":"crossref","unstructured":"Radharani S, Valarmathi M-L (2010) A study on watermarking schemes for image authentication. In: International Journal of Computer Applications, vol. 2, no. 4, June, p. 24\u201332","DOI":"10.5120\/658-925"},{"key":"1592_CR22","unstructured":"Randall A (2011) A novel semi-fragile watermarking scheme with iterative restoration. Available: http:\/\/aaronrandall.com\/files\/WatermarkingPaperLight.pdf (URL)"},{"key":"1592_CR23","doi-asserted-by":"crossref","unstructured":"Rubner Y, Tomasi C, Guibas L-J (2000) The earth mover\u2019s distance as a metric for image retrieval. In: Journal of Computer Vision, vol. 40, no. 2, pp. 99\u2013121","DOI":"10.1023\/A:1026543900054"},{"key":"1592_CR24","unstructured":"Sathik M-M, Sujatha S-S (2010) An improved invisible watermarking technique for image authentication. In: International Journal of Advanced Science and Technology, vo. 24, November, pp. 61\u201373"},{"key":"1592_CR25","doi-asserted-by":"crossref","unstructured":"Sencar HT, Ramkumar M, Akansu AN (2004) Communication with side information and data hiding. In: Data hiding fundamentals and applications: content security in digital media. ELSEVIER Academic Press, London, UK, ch. 3, sec. 3.3, pp. 35\u201339","DOI":"10.1016\/B978-012047144-7\/50003-0"},{"key":"1592_CR26","unstructured":"Shelly GB, Vermaat ME, Quasney JJ, Sebok SL, Jeffrey J (2008) Multimedia and content sharing. In: Discovering computers 2009: complete. Cengage Learning, Boston, USA, ch. 5, sec. \u2018Special Features\u2019, pp. 294\u2013297"},{"key":"1592_CR27","unstructured":"Shih FY (2012) \u201cWatermarking,\u201d and \u201cSteganography,\u201d. In: Multimedia security: watermarking, steganography, and forensics. CRC Press, Taylor and Francis Group, USA, ch. 2 and ch. 3, pp. 67\u2013181, and pp. 201\u2013215"},{"key":"1592_CR28","unstructured":"Sidra R, Lee K-H, Lee S-W (2012) Aesthetic score assessment based on generic features in digital photography. In: AUN\/SEED-Net regional conference on information and communication technology, Manila, Philippine, October, pp. 76\u201379"},{"key":"1592_CR29","unstructured":"Somayeh S, Sajjad D, Azizah A-M (2012) Efficient digital image authentication and tamper localization techniques using 3Lsb watermarking. In: IJCSI International Journal Of Computer Science, vol. 9, issue. 1, January, pp. 1\u20138"},{"key":"1592_CR30","unstructured":"Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. In: IEEE Trans. on Circuits and Systems for Video Technology, vol. 19, no. 6, June, pp. 906\u2013910"},{"key":"1592_CR31","unstructured":"Tian J (2002) Wavelet-based reversible watermarking for authentication. In: Proc. of SPIE 4675, Security and Watermarking of Multimedia Contents IV, vol. 4675, April, pp. 679\u2013690"},{"key":"1592_CR32","unstructured":"Tseng Y-C, Pan H-K (2001) Secure and invisible data hiding in 2 - color images. In: Proc. of IEEE Computer and Communication Societies, vol. 2, pp. 887\u2013896"},{"key":"1592_CR33","unstructured":"TsihrintzisGA, Jain LC (2008) Cryptography and data hiding for media security. In: Multimedia services in intelligent environments: advanced tools and methodologies. Springer, Berlin, Germany, ch. 9, sec. 9.1, pp. 227\u2013228"},{"key":"1592_CR34","doi-asserted-by":"crossref","unstructured":"Wu Y, Qiu B, Bao F (2007) Evaluating OUDA\u2019s tamper-localization watermarking scheme. In: Proc. of IEEE Conference on Multimedia and Expo, July, pp. 843\u2013846","DOI":"10.1109\/ICME.2007.4284782"},{"key":"1592_CR35","doi-asserted-by":"crossref","unstructured":"Yang H, Sun X (2007) Semi-fragile watermarking for image authentication and tamper detection using HVS model. In: IEEE conference on multimedia and ubiquitous engineering, April, pp. 26\u201328","DOI":"10.1109\/MUE.2007.189"},{"key":"1592_CR36","doi-asserted-by":"crossref","unstructured":"Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. In: IEEE Trans. on Multimedia, vol. 10, no. 8, December, pp.1490\u20131499","DOI":"10.1109\/TMM.2008.2007334"},{"key":"1592_CR37","unstructured":"Zoran D, Michael J, Sushil J (2005) Information hiding: steganography and steganalysis. In: Handbook of statistics 24: data mining and data visualization. USA: Elsevier, ch. 6, sec. 3, pp. 174\u2013179"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1592-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1592-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1592-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T00:21:26Z","timestamp":1563582086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1592-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,31]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["1592"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1592-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,31]]}}}