{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T07:03:43Z","timestamp":1648883023792},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T00:00:00Z","timestamp":1291680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1007\/s11265-010-0557-7","type":"journal-article","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T07:38:33Z","timestamp":1291621113000},"page":"187-199","source":"Crossref","is-referenced-by-count":1,"title":["An Authentication Technique for Image\/Legal Document (ATILD)"],"prefix":"10.1007","volume":"67","author":[{"given":"Nabin","family":"Ghoshal","sequence":"first","affiliation":[]},{"given":"J. K.","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"A.","family":"Khamrui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,7]]},"reference":[{"issue":"1","key":"557_CR1","first-page":"24","volume":"21","author":"N Ghoshal","year":"2008","unstructured":"Ghoshal, N., & Mandal, J. K. (2008). A novel technique for image authentication in frequency domain using discrete fourier transformation technique (IAFDDFTT). Malaysian Journal of Computer Science, ISSN 0127\u20139084, 21(1), 24\u201332.","journal-title":"Malaysian Journal of Computer Science, ISSN 0127\u20139084"},{"key":"557_CR2","unstructured":"Ghoshal, N., Mandal, J. K., et al. (2008). Masking based data hiding and image authentication technique (MDHIAT), Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM-2008, December 14\u201317th, Anna University, Chennai, India, pp. 119\u2013122."},{"key":"557_CR3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s11265-005-4153-1","volume":"41","author":"R Radhakrishnan","year":"2005","unstructured":"Radhakrishnan, R., Kharrazi, M., & Menon, N. (2005). Data masking: a new approach for steganography. Journal of VLSI Signal Processing, Springer, 41, 293\u2013303.","journal-title":"Journal of VLSI Signal Processing, Springer"},{"issue":"4","key":"557_CR4","first-page":"223","volume":"3","author":"NN EL-Emam","year":"2007","unstructured":"EL-Emam, N. N. (2007). Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science ISSN 1549\u20133636, 3(4), 223\u2013232.","journal-title":"Journal of Computer Science ISSN 1549\u20133636"},{"key":"557_CR5","doi-asserted-by":"crossref","unstructured":"Amin, P., Lue, N., & Subbalakshmi, K. (2005). Statistically secure digital image data hiding, (pp. 1\u20134). IEEE Multimedia Signal Processing MMSP05, Shanghai, China, Oct. 2005.","DOI":"10.1109\/MMSP.2005.248648"},{"issue":"4","key":"557_CR6","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., & Wornnel, G. W. (2001). Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4), 1423\u20131443.","journal-title":"IEEE Transactions on Information Theory"},{"key":"557_CR7","doi-asserted-by":"crossref","unstructured":"Chandramouli, R., & Memon, N. (2001). Analysis of LSB based image steganography techniques, (pp. 1019\u20131022). Proc. of ICIP, Thissaloniki, Greece.","DOI":"10.1109\/ICIP.2001.958299"},{"key":"557_CR8","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1117\/12.298462","volume":"3312","author":"CY Lin","year":"1998","unstructured":"Lin, C. Y., & Chang, S. F. (1998). A robust image authentication method surviving JPEG lossy compression. Proceedings of SPIE, 3312, 296\u2013307.","journal-title":"Proceedings of SPIE"},{"key":"557_CR9","doi-asserted-by":"crossref","unstructured":"Dumitrescu, S., Xiaolin, W., & Wang, Z. (2003). Detection of LSB steganography via sample pair analysis. In LNCS, (vol. 2578, pp. 355\u2013372). New York: Springer-Verlag","DOI":"10.1007\/3-540-36415-3_23"},{"issue":"3","key":"557_CR10","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/TIT.2002.808134","volume":"49","author":"P Moulin","year":"2003","unstructured":"Moulin, P., & O\u2019Sullivan, J. A. (2003). Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 49(3), 563\u2013593.","journal-title":"IEEE Transactions on Information Theory"},{"key":"557_CR11","doi-asserted-by":"crossref","unstructured":"Pavan, S., Gangadharpalli, S., & Sridhar, V. (2005). Multivariate entropy detector based hybrid image registration algorithm, (pp. 18\u201323). IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, March 2005.","DOI":"10.1109\/ICASSP.2005.1415544"},{"key":"557_CR12","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TKDE.2004.15","volume":"16","author":"HH Pang","year":"2004","unstructured":"Pang, H. H., Tan, K. L., & Zhou, X. (2004). Steganographic schemes for file system and B-tree. IEEE Transactions on Knowledge and Data Engineering, 16, 701\u2013713.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"557_CR13","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1109\/TIP.2002.802512","volume":"11","author":"P Moulin","year":"2002","unstructured":"Moulin, P., & Mihcak, M. K. (2002). A framework for evaluating the data-hiding capacity of image sources. IEEE Transactions on Image Processing, 11, 1029\u20131042.","journal-title":"IEEE Transactions on Image Processing"},{"key":"557_CR14","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MSP.2006.26","volume":"4","author":"C Rechberger","year":"2006","unstructured":"Rechberger, C., Rijman, V., & Sklavos, N. (2006). The NIST cryptographic workshop on hash functions. IEEE Security & Privacy, 4, 54\u201356.","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"557_CR15","first-page":"103","volume":"1","author":"AH Al-Hamami","year":"2005","unstructured":"Al-Hamami, A. H., & Al-Ani, S. A. (2005). A new approach for authentication technique. Journal of computer Science, ISSN 1549\u20133636, 1(1), 103\u2013106.","journal-title":"Journal of computer Science, ISSN 1549\u20133636"},{"key":"557_CR16","unstructured":"S-Tools: http:\/\/digitalforensics.Champlain.Edu\/download\/stools4.zip ."},{"key":"557_CR17","unstructured":"Kutter, M., Voloshynovskiy, S., & Herrigel, A. (2000). The Watermark copy attack. In Security and watermarking of multimedia contest II, SPIE-3971, (pp. 371\u2013380). San Josh, USA, Jan. 2000."},{"key":"557_CR18","doi-asserted-by":"crossref","unstructured":"Ergun, F., Kilian, J., & Kumar, R. (1999). A note on the limits of collusion-resistant watermarks. In Eurocrypt 1999 (pp. 140\u2013149, vol. 1592). LNCS, Springer Verlag.","DOI":"10.1007\/3-540-48910-X_10"},{"key":"557_CR19","doi-asserted-by":"crossref","unstructured":"Linnartz, J.-P. M. G., & Dijk, M. V. (1998). Analysis of the sensitivity attack against electronic watermarks in images. In workshop information hiding 1998 LNCS, (Vol. 1525, pp. 258\u2013272). Springer Verlag.","DOI":"10.1007\/3-540-49380-8_18"},{"key":"557_CR20","unstructured":"Weber, A. G. (1997). The usc-sipi image database: http:\/\/sipi.usc.edu\/services\/database\/Database.html , October 1997, Signal and Image Processing Institute at the University of Southern California."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-010-0557-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11265-010-0557-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-010-0557-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T20:53:37Z","timestamp":1559854417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11265-010-0557-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,7]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["557"],"URL":"https:\/\/doi.org\/10.1007\/s11265-010-0557-7","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,7]]}}}