{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T17:45:18Z","timestamp":1773683118301,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,11,13]],"date-time":"2010-11-13T00:00:00Z","timestamp":1289606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-010-0500-5","type":"journal-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T07:54:47Z","timestamp":1289548487000},"page":"883-897","source":"Crossref","is-referenced-by-count":19,"title":["Communication-resource-aware adaptive watermarking for multimedia authentication in\u00a0wireless multimedia sensor networks"],"prefix":"10.1007","volume":"64","author":[{"given":"Honggang","family":"Wang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,13]]},"reference":[{"key":"500_CR1","doi-asserted-by":"crossref","unstructured":"Hsieh M-S, Tseng D-C, Huang Y-H, (Oct 2001) Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans Ind Electron 48(5)","DOI":"10.1109\/41.954550"},{"key":"500_CR2","first-page":"24","volume-title":"Proc IEEE international conference on image processing","author":"KS Ntalianis","year":"2002","unstructured":"Ntalianis KS, Doulamis AD, Doulamis ND, Kollias S (2002) An automatic scheme for stereoscopic video object-based watermarking using qualified significant wavelet trees. In: Proc IEEE international conference on image processing, vol\u00a03. pp 24\u201328 June"},{"key":"500_CR3","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/ICIP.1994.413536","volume-title":"Proc IEEE int conf image processing","author":"RG Schyndel van","year":"1994","unstructured":"van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proc IEEE int conf image processing, vol 2. pp 86\u201390"},{"key":"500_CR4","first-page":"25","volume-title":"Proc the 2003 international symposium on circuits and systems","author":"NJ Mathai","year":"2003","unstructured":"Mathai NJ, Heikholeslami A, Kundur D (2003) VLSI implementation of a real-time video watermark embedder and detector. In: Proc the 2003 international symposium on circuits and systems, vol\u00a02, pp\u00a025\u201328 May"},{"key":"500_CR5","first-page":"391","volume-title":"Proc IEEE int conf image processing","author":"H Inoue","year":"1998","unstructured":"Inoue H, Miyazaki A, Yamamoto A, Katsura T (1998) A digital watermark based on the wavelet transform and its robustness on image compression. In: Proc IEEE int conf image processing, vol\u00a02, pp\u00a0391\u2013395"},{"key":"500_CR6","doi-asserted-by":"crossref","first-page":"3445","DOI":"10.1109\/78.258085","volume":"41","author":"JM Shapiro","year":"1993","unstructured":"Shapiro JM (Dec 1993) Embedded image coding using zerotrees of wavelet coefficients. IEEE Trans Signal Process 41:3445\u20133462","journal-title":"IEEE Trans Signal Process"},{"key":"500_CR7","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1049\/el:19990327","volume":"35","author":"Y-S Kim","year":"1999","unstructured":"Kim Y-S, Kwon O-H, Park R-H (Mar 1999) Wavelet based watermarking method for digital images using human visual system. Electron Lett 35:466\u2013468","journal-title":"Electron Lett"},{"key":"500_CR8","doi-asserted-by":"crossref","unstructured":"Li Z, Sun Q, Lian Y, Chen CW (June 2007) Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks. IEEE Trans Multimedia 9(4)","DOI":"10.1109\/TMM.2007.893338"},{"key":"500_CR9","first-page":"296","volume-title":"Proc SPIE storage and retrieval of image\/video database","author":"C-Y Lin","year":"1998","unstructured":"Lin C-Y, Chang S-F (1998) A robust image authentication method surviving JPEG lossy compression. In: Proc SPIE storage and retrieval of image\/video database, vol\u00a03312, pp 296\u2013307"},{"issue":"3","key":"500_CR10","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/TMM.2002.802018","volume":"4","author":"CW Wu","year":"2002","unstructured":"Wu CW (Jun 2002) On the design of content-based multimedia authenticationsystems. IEEE Trans Multimedia 4(3):385\u2013393","journal-title":"IEEE Trans Multimedia"},{"key":"500_CR11","unstructured":"De Couto D, Aguayo D, Bicket J, Morris R A high-throughput path metric for multi-hop wireless routing. In: ACM MobiCom\u201903"},{"key":"500_CR12","unstructured":"Warrier A, Le L, Rhee I Cross-layer optimization made practical, www4.ncsu.edu\/~acwarrie\/publications\/crossLayer.pdf"},{"issue":"10","key":"500_CR13","doi-asserted-by":"crossref","first-page":"1648","DOI":"10.1109\/TCOMM.2005.857142","volume":"53","author":"Z Wu","year":"2005","unstructured":"Wu Z, Bilgin A, Marcellin M (2005) Joint source\/channel coding for multiple images. IEEE Trans Commun 53(10):1648\u20131654","journal-title":"IEEE Trans Commun"},{"key":"500_CR14","doi-asserted-by":"crossref","first-page":"4091","DOI":"10.1109\/WCNC.2007.747","volume-title":"Proc IEEE wireless communications and networking conference (WCNC 2007)","author":"W Wang","year":"2007","unstructured":"Wang W, Peng D, Wang H, Sharif H, Chen H (2007) Energy efficient multirate interaction in distributed source coding and wireless sensor network. In: Proc IEEE wireless communications and networking conference (WCNC 2007), Mar, pp 4091\u20134095"},{"key":"500_CR15","doi-asserted-by":"crossref","unstructured":"Wang W, Peng D, Wang H, Sharif H, Chen HH (Oct. 2008) Energy-constrained distortion reduction optimization for image transmission in wireless sensor networks. IEEE Trans Multimedia 10(6)","DOI":"10.1109\/TMM.2008.2001354"},{"key":"500_CR16","volume-title":"Proc IEEE global communications conference","author":"H Wang","year":"2007","unstructured":"Wang H, Peng D, Wang W, Sharif H, Chen HH (2007) Collaborative image transmissions based on region and path diversity in wireless sensor network. In: Proc IEEE global communications conference, Nov, pp\u00a0971\u2013975"},{"key":"500_CR17","first-page":"1097","volume":"45","author":"C-T Hsu","year":"1998","unstructured":"Hsu C-T, Wu J-L (Aug 1998) Multiresolution watermarking for digital images. IEEE Trans Consumer Electron 45:1097\u2013101","journal-title":"IEEE Trans Consumer Electron"},{"issue":"1","key":"500_CR18","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/JPROC.2007.909926","volume":"96","author":"Q Sun","year":"2008","unstructured":"Sun Q, Apostolopoulos J, Chen C-W, Chang S-F (Jan 2008) Quality-optimized and secure end-to-end authentication for media delivery. IEEE Proc 96(1):97\u2013110","journal-title":"IEEE Proc"},{"key":"500_CR19","first-page":"2810","volume-title":"Proc IEEE WCNC","author":"W Wang","year":"2008","unstructured":"Wang W, Peng D, Wang H, Sharif H, Chen H-H (2008) Energy-distortion-authentication optimized resource allocation for secure wireless image streaming. In: Proc IEEE WCNC, pp 2810\u20132815"},{"issue":"2","key":"500_CR20","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/TMM.2006.886281","volume":"9","author":"Z Zhang","year":"2007","unstructured":"Zhang Z, Sun Q, Wong W, Apostolopoulos J, Wee S (Feb. 2007) An optimized content-aware authentication scheme for streaming JPEG-2000 images over lossy networks. IEEE Trans Multimedia 9(2):320\u2013331","journal-title":"IEEE Trans Multimedia"},{"issue":"1","key":"500_CR21","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TMM.2006.886384","volume":"9","author":"M Schaar van der","year":"2007","unstructured":"van der Schaar M, Turaga D (Jan. 2007) Cross-layer packetization and retransmission strategies for delay-sensitive wireless multimedia transmission. IEEE Trans Multimedia 9(1):185\u2013197","journal-title":"IEEE Trans Multimedia"},{"issue":"8","key":"500_CR22","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1109\/TIP.2005.851681","volume":"14","author":"Z Wu","year":"2005","unstructured":"Wu Z, Bilgin A, Marcellin M (Aug. 2005) Joint source\/channel coding for image transmission with JPEG2000 over memoryless channels. IEEE Trans Image Process 14(8):1020\u20131032","journal-title":"IEEE Trans Image Process"},{"key":"500_CR23","first-page":"1479","volume-title":"Proc ICC \u201908. IEEE international conference on communicaitons","author":"H Wang","year":"2008","unstructured":"Wang H, Peng D, Wang W, Sharif H, Chen H-H (2008) Energy-aware adaptive watermarking for real-time image delivery in wireless sensor networks. In: Proc ICC \u201908. IEEE international conference on communicaitons, 19\u201323 May, pp 1479\u20131483"},{"issue":"4","key":"500_CR24","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1142\/S0219622008003204","volume":"7","author":"Y Peng","year":"2008","unstructured":"Peng Y, Kou G, Shi Y, Chen Z (2008) A descriptive framework for the field of data mining and knowledge discovery. Int J Inform Technol Decis Making 7(4): 639\u2013682","journal-title":"Int J Inform Technol Decis Making"},{"issue":"2","key":"500_CR25","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1142\/S0219622010003804","volume":"9","author":"J Chen","year":"2010","unstructured":"Chen J, Lin Q, Hu Q (March 2010) Application of novel clonal algorithm in multiobjective optimization. Int J Inform Technol Decis Making 9(2):239\u2013266,","journal-title":"Int J Inform Technol Decis Making"},{"issue":"4","key":"500_CR26","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1142\/S0219622009003697","volume":"8","author":"L Zhao","year":"2009","unstructured":"Zhao L, Jiang Y (December 2009) A game theoretic optimization model between project risk set and measure set. Int J Inform Technol Decis Making 8(4):769\u2013786","journal-title":"Int J Inform Technol Decis Making"},{"issue":"4","key":"500_CR27","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S0219622008003137","volume":"7","author":"M Better","year":"2008","unstructured":"Better M, Glover F, Kochenberger G, Wang H (2008) Simulation optimization: applications in risk management. Int J Inform Technol Decis Making 7(4):571\u2013587","journal-title":"Int J Inform Technol Decis Making"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0500-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0500-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0500-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T03:30:05Z","timestamp":1559791805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0500-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,13]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["500"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0500-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,13]]}}}