{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T20:31:27Z","timestamp":1711485087435},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T00:00:00Z","timestamp":1517961600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-017-5232-x","type":"journal-article","created":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T01:51:12Z","timestamp":1517968272000},"page":"2389-2401","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementing Efficient Audio and Image Watermarking Using Multi-resolution Dual Wavelet and Fireflies Approach in Wireless Network"],"prefix":"10.1007","volume":"102","author":[{"given":"S.","family":"Venkatesh","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Dorairangaswamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,7]]},"reference":[{"issue":"1","key":"5232_CR1","doi-asserted-by":"publisher","first-page":"6976","DOI":"10.1109\/TBC.2004.838265","volume":"51","author":"S Wu","year":"2005","unstructured":"Wu, S., Huang, J., Huang, D., & Shi, Y. Q. (2005). Efficiently self-synchronized audio watermarking for assured audio data transmission. IEEE Transactions on Broadcasting, 51(1), 6976. \n                    https:\/\/doi.org\/10.1109\/TBC.2004.838265\n                    \n                  .","journal-title":"IEEE Transactions on Broadcasting"},{"key":"5232_CR2","first-page":"272","volume":"1","author":"SJ Lee","year":"2001","unstructured":"Lee, S. J., & Jung, S. H. (2001). A survey of watermarking techniques applied to multimedia. Proceedings of the IEEE International Symposium on Industrial Electronics, 1, 272\u2013277.","journal-title":"Proceedings of the IEEE International Symposium on Industrial Electronics"},{"issue":"12","key":"5232_CR3","doi-asserted-by":"publisher","first-page":"4707","DOI":"10.1109\/TSP.2005.859323","volume":"53","author":"P Kumsawat","year":"2005","unstructured":"Kumsawat, P., Attakitmongcol, K., & Srikaew, A. (2005). A new approach for optimization in image watermarking by using genetic algorithms. IEEE Transactions on Signalrocessing, 53(12), 4707\u20134719.","journal-title":"IEEE Transactions on Signalrocessing"},{"key":"5232_CR4","doi-asserted-by":"crossref","unstructured":"Sriyingyong, N., & Attakitmongcol, K. (2006). Wavelet-based audio watermarking using adaptive tabu search. In Proceedings of the 1st international symposium on wireless pervasive computing, January 2006 (Vol. 1, pp. 15). Phuket, Thailand.","DOI":"10.1109\/ISWPC.2006.1613617"},{"issue":"10","key":"5232_CR5","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/83.951534","volume":"10","author":"K Attakitmongcol","year":"2001","unstructured":"Attakitmongcol, K., Hardin, D. P., & Wilkes, D. M. (2001). Multiwavelet prefilters\u2014Part II: Optimal orthogonal prefilters. IEEE Transactions on Image Processing, 10(10), 1476\u20131487. \n                    https:\/\/doi.org\/10.1109\/83.951534\n                    \n                  .","journal-title":"IEEE Transactions on Image Processing"},{"issue":"9","key":"5232_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/1715-2299","volume":"12","author":"B Isac","year":"2011","unstructured":"Isac, B., & Santhi, V. (2011). A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications, 12(9), 1\u20136.","journal-title":"International Journal of Computer Applications"},{"issue":"3","key":"5232_CR7","first-page":"191","volume":"23","author":"H-H Tsai","year":"2005","unstructured":"Tsai, H.-H., & Cheng, S. (2005). Adaptive signal-dependent audio watermarking based on human auditory system and neural networks. Applied, 23(3), 191\u2013206.","journal-title":"Applied"},{"issue":"5","key":"5232_CR8","first-page":"2233","volume":"2","author":"YK Jain","year":"2011","unstructured":"Jain, Y. K., & Tiwari, S. (2011). An enhanced digital watermarking for color image using support vector machine. International Journal of Computer Science and Information Technologies, 2(5), 2233\u20132236.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"5232_CR9","doi-asserted-by":"publisher","first-page":"1470","DOI":"10.1016\/j.jss.2010.03.006","volume":"83","author":"H Peng","year":"2010","unstructured":"Peng, H., Wang, J., & Wang, W. (2010). Image watermarking method in multiwavelet domain based on supportvector machines. The Journal of Systems and Software, 83, 1470\u20131477.","journal-title":"The Journal of Systems and Software"},{"issue":"5","key":"5232_CR10","first-page":"45","volume":"3","author":"K Babyrani","year":"2014","unstructured":"Babyrani, K., & Geetamma, T. (2014). An informed watermarking scheme using hidden Markov model in the wavelet domain. International Journal of Advanced Trends in Computer Science and Engineering, 3(5), 45\u201348.","journal-title":"International Journal of Advanced Trends in Computer Science and Engineering"},{"key":"5232_CR11","unstructured":"Jarwin, M. J. P., & Priyatharsini, S. (2014). An approach using hidden Markov model to design a robust watermarking scheme. IOSR Journal of Electronics and Communication Engineering,\u00a09(3),\u00a029\u201335."},{"issue":"7","key":"5232_CR12","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"Mallat, S. G. (1989). A theory for multiresolution signal decomposition: The wavelet representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 11(7), 674\u2013693.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"5232_CR13","unstructured":"Akansu, A. N., & Haddad, R. A. Multiresolution signal decomposition. \n                    http:\/\/www.sciencedirect.com\/science\/book\/9780120471416\n                    \n                  ."},{"key":"5232_CR14","first-page":"12","volume":"6","author":"S Shoghian","year":"2012","unstructured":"Shoghian, S., & Kouzehgar, M. (2012). A comparison among wolf pack search and four other optimization algorithms. World Academy of Science, Engineering and Technology, 6, 12.","journal-title":"World Academy of Science, Engineering and Technology"},{"issue":"3","key":"5232_CR15","first-page":"732","volume":"67","author":"A Suresh","year":"2014","unstructured":"Suresh, A. (2014). An efficient view classification of echocardiogram using morphological operations. Journal of Theoretical and Applied Information Technology (JATIT), 67(3), 732\u2013735.","journal-title":"Journal of Theoretical and Applied Information Technology (JATIT)"},{"key":"5232_CR16","isbn-type":"print","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of cryptography I: Basic tools","author":"O Goldreich","year":"2001","unstructured":"Goldreich, O. (2001). Foundations of cryptography I: Basic tools. Cambridge: Cambridge University Press. ISBN 978-0-511-54689-1.","ISBN":"http:\/\/id.crossref.org\/isbn\/9780511546891"},{"issue":"36","key":"5232_CR17","first-page":"419","volume":"09","author":"A Suresh","year":"2016","unstructured":"Suresh, A. (2016). Sentiment classification using decision tree based feature selection (IJCTA). International Journal of Control Theory and Applications, 09(36), 419\u2013425.","journal-title":"International Journal of Control Theory and Applications"},{"key":"5232_CR18","doi-asserted-by":"crossref","unstructured":"Balgurgi, P. P., & Jagtap, S. K. (2012). Intelligent processing: An approach of audio steganography. In IEEE international conference on communication, information and computing technology (ICCICT), October 19\u201320, Mumbai, India.","DOI":"10.1109\/ICCICT.2012.6398182"},{"key":"5232_CR19","first-page":"402","volume":"9","author":"G Nehru","year":"2012","unstructured":"Nehru, G., & Dhar, P. (2012). A detailed look of audio steganography techniques using LSB and genetic algorithm approach. International Journal of Computer Science (IJCSI), 9, 402\u2013406.","journal-title":"International Journal of Computer Science (IJCSI)"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5232-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5232-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5232-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T20:06:21Z","timestamp":1549483581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5232-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,7]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5232"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5232-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,7]]},"assertion":[{"value":"7 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}