{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T11:34:58Z","timestamp":1715772898304},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2017,9,22]],"date-time":"2017-09-22T00:00:00Z","timestamp":1506038400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-5214-8","type":"journal-article","created":{"date-parts":[[2017,9,22]],"date-time":"2017-09-22T08:43:23Z","timestamp":1506069803000},"page":"16447-16459","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach"],"prefix":"10.1007","volume":"77","author":[{"given":"Rohini","family":"Srivastava","sequence":"first","affiliation":[]},{"given":"Basant","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Mohan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,22]]},"reference":[{"issue":"2","key":"5214_CR1","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/s10278-015-9822-4","volume":"29","author":"G Badshah","year":"2016","unstructured":"Badshah G, Liew S-C (2016) J M Zain and M Ali, watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216\u2013225","journal-title":"J Digit Imaging"},{"key":"5214_CR2","doi-asserted-by":"crossref","unstructured":"Goudiaa D, Chaumont M, Puech W, Said NH (2011) A joint JPEG2000 compression and watermarking system using a TCQ-based quantization scheme, in: visual information processing and communication II(VIPC 2011), 78820C\u201378820C","DOI":"10.1117\/12.872122"},{"key":"5214_CR3","doi-asserted-by":"crossref","unstructured":"Guillemot L and Moureaux J (2006) Indexing lattice vectors in a joint watermarking and compression scheme, vol 2. In: IEEE Int. Conf. Acoustics, Speech. Signal Processing, Toulouse, pp 329\u2013332","DOI":"10.1109\/ICASSP.2006.1660346"},{"issue":"8","key":"5214_CR4","doi-asserted-by":"crossref","first-page":"2056","DOI":"10.1109\/TIP.2010.2045709","volume":"19","author":"J-M Guo","year":"2010","unstructured":"Guo J-M, Liu Y-F (2010) Joint compression\/watermarking scheme using majority parity guidance and Halftoning-based block truncation coding. IEEE Trans Image Process 19(8):2056\u20132069","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"5214_CR5","first-page":"53","volume":"8","author":"A Javeed","year":"2016","unstructured":"Javeed A, Singh AK (2016) Robust and imperceptible image watermarking in DWT-BTC domain. Int J Electro Sec Digit Foren Inder Sci 8(1):53\u201362","journal-title":"Int J Electro Sec Digit Foren Inder Sci"},{"key":"5214_CR6","unstructured":"Lin MH, Chang CC (2004) A novel information hiding scheme based on BTC. In: Proc Int Conf Computer and Information Technology, Wuhan, pp 66\u201371"},{"issue":"1\u20132","key":"5214_CR7","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.csi.2009.06.004","volume":"32","author":"SD Lin","year":"2010","unstructured":"Lin SD, Shie S-C, Guo JY (2010) Improving the robustness of DCT-based image watermarking against JPEG compression. J Comp Stand Inter 32(1\u20132):54\u201360","journal-title":"J Comp Stand Inter"},{"key":"5214_CR8","doi-asserted-by":"crossref","unstructured":"Maheshawari JP, Kumar M, Mathur Garima, Yadav RP, Kakerda RK (2015) Robust digital image watermarking using DCT based pyramid transform via image compression. In: Proc of 2015 International Conference on Communications and Signal Processing, Melmaruvathur, pp\u00a01059\u20131063","DOI":"10.1109\/ICCSP.2015.7322663"},{"key":"5214_CR9","doi-asserted-by":"crossref","unstructured":"Mary SJJ, Christopher CS, Joe SSA (2016) Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits Syst 7(8):1722\u20131733","DOI":"10.4236\/cs.2016.78149"},{"key":"5214_CR10","first-page":"340","volume-title":"Second generation benchmarking and application oriented evaluation","author":"S Pereira","year":"2001","unstructured":"Pereira S, Voloshynovskiy S, Madue\u00f1o M, Marchand-Maillet S, Pun T (2001) Second generation benchmarking and application oriented evaluation. Information hiding workshop III, Pittsburgh, In, pp 340\u2013353"},{"key":"5214_CR11","first-page":"161","volume":"6","author":"S Qureshi","year":"2013","unstructured":"Qureshi S, Nair S (2013) LSB Based Image Watermarking with Hybrid Compression-Encryption Technique. Advance EngTechnol Series 6:161\u2013165","journal-title":"Advance EngTechnol Series"},{"key":"5214_CR12","doi-asserted-by":"crossref","unstructured":"Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applications, book series on multimedia systems and applications. Springer, USA","DOI":"10.1007\/978-3-319-57699-2"},{"key":"5214_CR13","doi-asserted-by":"crossref","unstructured":"Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, USA, pp 246\u2013272.","DOI":"10.4018\/978-1-5225-0105-3.ch011"},{"key":"5214_CR14","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1117\/12.465329","volume-title":"Proceedings of SPIE security watermarking multimedia contents IV","author":"J Tian","year":"2002","unstructured":"Tian J (2002) Wavelet based reversible watermarking for authentication. In: Proceedings of SPIE security watermarking multimedia contents IV. CA, San Jose, pp 679\u2013690"},{"key":"5214_CR15","unstructured":"Xie L, Arce GR (1998) Joint wavelet compression and authentication watermarking, In Proceedings of the 5th IEEE International Conference on Image Processing"},{"key":"5214_CR16","doi-asserted-by":"publisher","unstructured":"Zear A, Singh AK, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-016-3862-8","DOI":"10.1007\/s11042-016-3862-8"},{"key":"5214_CR17","doi-asserted-by":"crossref","unstructured":"Zhou Y (2010) Joint robust watermarking and image compression, IEEE International Workshop on Information Forensics and Security, 12-15 Dec","DOI":"10.1109\/WIFS.2010.5711440"},{"key":"5214_CR18","doi-asserted-by":"crossref","unstructured":"Zhou Y and Yang E-H (2009) Joint robust watermarking and compression using variable-rate scalar quantization in proc. of The 11th Canadian Workshop on Information Theory, Ottawa, Canada, May","DOI":"10.1109\/CWIT.2009.5069550"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5214-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5214-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5214-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T17:23:24Z","timestamp":1570123404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5214-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,22]]},"references-count":18,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5214"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5214-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,22]]}}}