{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:22:42Z","timestamp":1726064562997},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T00:00:00Z","timestamp":1449705600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s11277-015-3142-3","type":"journal-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T12:49:38Z","timestamp":1449751778000},"page":"479-491","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels"],"prefix":"10.1007","volume":"88","author":[{"given":"Sabry S.","family":"Nassar","sequence":"first","affiliation":[]},{"given":"Nabil M.","family":"Ayad","sequence":"additional","affiliation":[]},{"given":"Hamdy M.","family":"Kelash","sequence":"additional","affiliation":[]},{"given":"Hala S.","family":"El-sayed","sequence":"additional","affiliation":[]},{"given":"Mohsen A. M.","family":"El-Bendary","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]},{"given":"Osama S.","family":"Faragallah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,10]]},"reference":[{"key":"3142_CR1","volume-title":"Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property","author":"DC Lou","year":"2003","unstructured":"Lou, D. C., Liu, J. L., & Li, C. T. (2003). Digital signature-based image authentication. In C. S. Lu (Ed.), Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Hershey: Idea Group Inc."},{"key":"3142_CR2","doi-asserted-by":"crossref","unstructured":"Petrovic, R. (2005). Digital watermarks for audio integrity verification. Serbia and Montenegro, Nis, pp. 28\u201330.","DOI":"10.1109\/TELSKS.2005.1572095"},{"key":"3142_CR3","doi-asserted-by":"crossref","unstructured":"Chang, W. H., & Chang, L. W. (2010). Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments. In Communications and Information Technologies (ISCIT).","DOI":"10.1109\/ISCIT.2010.5665087"},{"issue":"4","key":"3142_CR4","doi-asserted-by":"crossref","first-page":"24","DOI":"10.5120\/658-925","volume":"2","author":"S Radharani","year":"2010","unstructured":"Radharani, S., & Valarmathi, M. L. (2010). A study of watermarking scheme for image authentication. International Journal of Computer Applications, 2(4), 24\u201332.","journal-title":"International Journal of Computer Applications"},{"issue":"2","key":"3142_CR5","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1117\/1.1557156","volume":"12","author":"C-T Li","year":"2003","unstructured":"Li, C.-T., & Yang, F.-M. (2003). One-dimensional neighborhood forming strategy for fragile watermarking. Journal of Electronic Imaging, 12(2), 284\u2013291.","journal-title":"Journal of Electronic Imaging"},{"key":"3142_CR6","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M Barni","year":"1998","unstructured":"Barni, M., Bartolini, F., Cappellini, V., & Piva, A. (1998). A DCT-domain system for robust image watermarking. Signal Processing, 66, 357\u2013372.","journal-title":"Signal Processing"},{"issue":"12","key":"3142_CR7","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673\u20131687.","journal-title":"IEEE Transactions on Image Processing"},{"key":"3142_CR8","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F Hartung","year":"1998","unstructured":"Hartung, F., & Girod, B. (1998). Watermarking of uncompressed and compressed video. Signal Processing, 66, 283\u2013301.","journal-title":"Signal Processing"},{"key":"3142_CR9","first-page":"694","volume":"3","author":"C-T Li","year":"2000","unstructured":"Li, C.-T., Lou, D.-C., & Liu, J.-L. (2000). Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. International Conference on Image Processing, 3, 694\u2013697.","journal-title":"International Conference on Image Processing"},{"key":"3142_CR10","unstructured":"www.ijcta.com\/documents\/\u2026\/ijcta2011020544.pdf"},{"issue":"5","key":"3142_CR11","first-page":"41","volume":"13","author":"F Sultana","year":"2013","unstructured":"Sultana, F., Charles, S., & Govardhan, A. (2013). A tamper proof noise resilient end to end image based authentication system over wireless transmission with AWGN channel using wavelet based templates and AES. IJCSNS International Journal of Computer Science and Network Security, 13(5), 41\u201348.","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"3142_CR12","unstructured":"Shoemaker, C. (2002). Rudko. Hidden bits: A survey of techniques for digital watermarking. Independent Study EER-290 Prof Rudko, Spring."},{"key":"3142_CR13","doi-asserted-by":"crossref","unstructured":"Tewfik, A. H. (2000). Digital watermarking. San Mercury News.","DOI":"10.1109\/MSP.2000.879336"},{"key":"3142_CR14","doi-asserted-by":"crossref","unstructured":"Goel, S., Rana, A., Kaur, M. (2013). A review of comparison techniques of image steganography. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 6(1), 41\u201348. ISSN: 2278-1676, p-ISSN: 2320-3331.","DOI":"10.9790\/1676-0614148"},{"key":"3142_CR15","doi-asserted-by":"crossref","unstructured":"El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 1\u201314.","DOI":"10.1186\/1687-4722-2012-4"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3142-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-3142-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3142-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T09:35:03Z","timestamp":1567416903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-3142-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,10]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["3142"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-3142-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,10]]}}}