{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:21:08Z","timestamp":1730208068141,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,18]]},"DOI":"10.1109\/civemsa52099.2021.9493672","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T21:05:25Z","timestamp":1627419925000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["A DWT-Based Blind Robust High Capacity and Secure Digital Watermarking and Information Hiding Scheme for Image Authentication, Tampering Localization and Automatic Self-Recovery"],"prefix":"10.1109","author":[{"given":"Swapnil S.","family":"Chaughule","sequence":"first","affiliation":[{"name":"University of Massachusetts,CMINDS research center,Department of Electrical and Computer Engineering,Lowell,U.S.A"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. B.","family":"Megherbi","sequence":"additional","affiliation":[{"name":"University of Massachusetts,CMINDS research center,Department of Electrical and Computer Engineering,Lowell,U.S.A"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCON.2014.6965223"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SCEECS.2016.7509352"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2001.931796"},{"key":"ref13","first-page":"1","article-title":"Content Adaptive Watermarking Based on Stochastic Multi-resolution Image Modelling","author":"voloshynovskiy","year":"2000","journal-title":"Signal Processing Conference 2000 10th European"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1117\/12.569641"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2003.1273384"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMETE.2016.103"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2009.5341268"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2010.12"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2018.8574143"},{"key":"ref4","first-page":"2250","article-title":"A Robust Watermarking Approach using DCT-DWT","volume":"2","author":"singh","year":"2012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2016.7737391"},{"key":"ref6","first-page":"1","article-title":"Secured Digital Image Watermarking with Discrete Cosine Transform and Discrete wavelet Transform method","author":"seth","year":"2016","journal-title":"2016 International Conference on Advances in Computing Communication & Automation (ICACCA) (Spring)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2015.245"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSMW.2016.7538148"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SCES.2014.6880072"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2015.150"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2014.95"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HST47167.2019.9032981"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2012.12.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CIVEMSA.2018.8440006"},{"key":"ref24","article-title":"High-Capacity Blind Information Hiding Schemes Using Tchebichef Moments","author":"shoura","year":"2010","journal-title":"Proceedings of the IEEE International Conference on Future Computer and Communications (IFCCC)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.03.021"}],"event":{"name":"2021 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","start":{"date-parts":[[2021,6,18]]},"location":"Hong Kong, China","end":{"date-parts":[[2021,6,20]]}},"container-title":["2021 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9493663\/9493571\/09493672.pdf?arnumber=9493672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:46:28Z","timestamp":1659483988000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9493672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,18]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/civemsa52099.2021.9493672","relation":{},"subject":[],"published":{"date-parts":[[2021,6,18]]}}}