{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:57:12Z","timestamp":1729609032522,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/afrcon.2017.8095499","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T16:04:21Z","timestamp":1511885061000},"page":"303-308","source":"Crossref","is-referenced-by-count":0,"title":["Investigation of the effects on embedded watermarks under image manipulations"],"prefix":"10.1109","author":[{"given":"Nilesh","family":"Moti","sequence":"first","affiliation":[]},{"given":"Theo G.","family":"Swart","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An enhanced least significant bit steganographic method for information hiding","year":"2013","author":"kamau","key":"ref4"},{"key":"ref3","first-page":"34","article-title":"Least significant bit algorithm for image steganography","volume":"3","author":"champakamala","year":"2014","journal-title":"Int J Adv Comput Technol"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/83.136597"},{"key":"ref6","first-page":"104","article-title":"DWT based digital image watermarking, de-watermarking & authentication","volume":"7","author":"pithiya","year":"2013","journal-title":"Int J Eng Research & Development"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"175","DOI":"10.14257\/ijsia.2015.9.4.17","article-title":"A robust watermarking scheme based on least significant bit and discrete cosine transform","volume":"9","author":"fu-an","year":"2015","journal-title":"International Journal of Security and Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246715"},{"key":"ref7","first-page":"104","article-title":"A digital watermarking algorithm based on DCT and DWT","author":"jiansheng","year":"2009","journal-title":"Proc Int Symp Web Inform Syst Applicat"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1996.535015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/76.499834"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2012.2208"}],"event":{"name":"2017 IEEE AFRICON","start":{"date-parts":[[2017,9,18]]},"location":"Cape Town","end":{"date-parts":[[2017,9,20]]}},"container-title":["2017 IEEE AFRICON"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8085624\/8095433\/08095499.pdf?arnumber=8095499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T00:14:15Z","timestamp":1570407255000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8095499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/afrcon.2017.8095499","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}