{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:36:15Z","timestamp":1773524175486,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11277-018-6097-3","type":"journal-article","created":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T04:09:43Z","timestamp":1544242183000},"page":"1535-1551","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device"],"prefix":"10.1007","volume":"104","author":[{"given":"Rabeah","family":"Noor","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4895-7544","authenticated-orcid":false,"given":"Ahmed","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aaliya","family":"Sarfaraz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"6097_CR1","first-page":"82","volume":"15","author":"PS Venugopala","year":"2017","unstructured":"Venugopala, P. S., Sarojadevi, H., & Chiplunkar, N. N. (2017). An approach to embed image in video as watermark using a mobile device. Sustainable Computing: Informatics and Systems,\n                           15, 82\u201387.","journal-title":"Sustainable Computing: Informatics and Systems"},{"issue":"5","key":"6097_CR2","first-page":"4451","volume":"28","author":"A Khan","year":"2016","unstructured":"Khan, A., Sohaib, M., & Amjad, F. M. (2016). High-capacity multi-layer framework for highly robust textual steganography. Science International,\n                           28(5), 4451\u20134457.","journal-title":"Science International"},{"issue":"6","key":"6097_CR3","first-page":"6091","volume":"27","author":"A Khan","year":"2015","unstructured":"Khan, A. (2015). Comparative analysis of watermarking techniques. Science International,\n                           27(6), 6091\u20136096.","journal-title":"Science International"},{"key":"6097_CR4","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.future.2018.05.027","volume":"88","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Saxena, N., Mishra, K. K., & Sangaiah, A. K. (2018). Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Generation Computer Systems, 88, 92\u2013106.","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"6097_CR5","first-page":"426","volume":"4","author":"A Khan","year":"2015","unstructured":"Khan, A. (2015). Robust Textual Steganography. Journal of Science,\n                           4(4), 426\u2013434.","journal-title":"Journal of Science"},{"issue":"4","key":"6097_CR6","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s11277-018-5989-6","volume":"103","author":"A Khan","year":"2018","unstructured":"Khan, A., & Sarfaraz, A. (2018). Copy\/move forgery detection in MPEG videos used for personal communications. Wireless Personal Communications, 103(4), 2995\u20133008.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"6097_CR7","first-page":"525","volume":"3","author":"A Khan","year":"2014","unstructured":"Khan, A. (2014). Joint ownership verification for digital text. Advances in Computer Science and its Applications (ACSA),\n                           3(4), 525\u2013531.","journal-title":"Advances in Computer Science and its Applications (ACSA)"},{"key":"6097_CR8","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.future.2016.11.023","volume":"86","author":"AK Singh","year":"2016","unstructured":"Singh, A. K., Kumar, B., Singh, S. K., Ghrera, S. P., & Mohan, A. (2016). Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems,\n                           86, 926\u2013939.","journal-title":"Future Generation Computer Systems"},{"key":"6097_CR9","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.future.2017.12.009","volume":"82","author":"K Hameed","year":"2018","unstructured":"Hameed, K., Khan, A., Ahmed, M., Reddy, A. G., & Rathore, M. M. (2018). Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Generation Computer Systems,\n                           82, 274\u2013289.","journal-title":"Future Generation Computer Systems"},{"key":"6097_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3441-1","author":"A Khan","year":"2018","unstructured":"Khan, A., & Sarfaraz, A. (2018). Novel high-capacity robust and imperceptible image steganography scheme using multi flipped permutations and frequency entropy matching method. Soft Computing. \n                    https:\/\/doi.org\/10.1007\/s00500-018-3441-1\n                    \n                  .","journal-title":"Soft Computing"},{"issue":"4","key":"6097_CR11","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s11277-018-5989-6","volume":"103","author":"A Sarfaraz","year":"2018","unstructured":"Sarfaraz, A., & Khan, A. (2018). Feature selection based correlation attack on HTTPS secure searching. Wireless Personal Communications,\n                           103(4), 2995\u20133008.","journal-title":"Wireless Personal Communications"},{"issue":"12 (Part 6)","key":"6097_CR12","first-page":"39","volume":"4","author":"AA Nayak","year":"2014","unstructured":"Nayak, A. A., Venugopala, P. S., Sarojadevi, H., & Chiplunkar, N. N. (2014). A survey and comparative study on video watermarking techniques with reference to mobile devices. International Journal of Engineering Research and Applications,\n                           4(12 (Part 6)), 39\u201344.","journal-title":"International Journal of Engineering Research and Applications"},{"key":"6097_CR13","volume-title":"Beginning android application development","author":"L Wei- Meng","year":"2011","unstructured":"Wei- Meng, L. (2011). Beginning android application development. Hoboken: Wiely."},{"issue":"8(Version 1)","key":"6097_CR14","first-page":"5","volume":"4","author":"M Suresh Kumar","year":"2014","unstructured":"Suresh Kumar, M., & Madhavi Latha, G. (2014). DCT based secret image hiding in video sequence. International Journal of Engineering Research and Applications,\n                           4(8(Version 1)), 5\u20139.","journal-title":"International Journal of Engineering Research and Applications"},{"key":"6097_CR15","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.procs.2016.07.234","volume":"93","author":"M Haribabu","year":"2016","unstructured":"Haribabu, M., Bindu, C. H., & Swamy, K. V. (2016). A secure & invisible image watermarking scheme based on wavelet transform in HSI color space. Procedia Computer Science, 93, 462\u2013468.","journal-title":"Procedia Computer Science"},{"key":"6097_CR16","unstructured":"Gupta, A., Chandwani, A., & Yadav, G. (2014). RGB image watermarking on video frames using DWT. In Confluence the next generation information technology summit (confluence), 5th international conference, at Noida, on 25\u201326, (pp. 675\u2013680)."},{"key":"6097_CR17","unstructured":"Abraham, J., & Paul, V. (2016). An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University-Computer and Information Sciences."},{"key":"6097_CR18","doi-asserted-by":"crossref","unstructured":"Siddiqui, A., & Kaur, A. (2017). A secure and robust image watermarking system using wavelet domain. In 2017 7th international conference on cloud computing, data science & engineering-confluence (pp. 599\u2013604). IEEE.","DOI":"10.1109\/CONFLUENCE.2017.7943222"},{"key":"6097_CR19","doi-asserted-by":"crossref","unstructured":"Robert, A., & Doerr, G. (2013). Impact of content mastering on the throughput of a bit stream video watermarking system. In 2013 20th IEEE international conference on image processing (ICIP).","DOI":"10.1109\/ICIP.2013.6738933"},{"issue":"3","key":"6097_CR20","doi-asserted-by":"publisher","first-page":"19","DOI":"10.14257\/ijsia.2018.12.3.03","volume":"12","author":"A Khan","year":"2018","unstructured":"Khan, A., & Sarfaraz, A. (2018). Practical Guidelines for securing wireless local area networks (WLANs). International Journal of Security and Its Applications,\n                           12(3), 19\u201328.","journal-title":"International Journal of Security and Its Applications"},{"issue":"2","key":"6097_CR21","first-page":"361","volume":"29","author":"A Khan","year":"2017","unstructured":"Khan, A., & Sarfaraz, A. (2017). Vetting the security of mobile applications. Science International,\n                           29(2), 361\u2013365.","journal-title":"Science International"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-6097-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6097-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6097-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,7]],"date-time":"2019-12-07T19:21:23Z","timestamp":1575746483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-6097-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["6097"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-6097-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"8 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}