{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:21:01Z","timestamp":1769034061993,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331506","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Reliable Digital Image Authentication Using DNPLSB based Watermarking for Tamper Detection in Facial Images"],"prefix":"10.1109","author":[{"given":"Rupa","family":"Chiramdasu","sequence":"first","affiliation":[{"name":"Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India"}]},{"given":"B","family":"Akshitha Yadav","sequence":"additional","affiliation":[{"name":"Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India"}]},{"given":"K","family":"Sushmasri","sequence":"additional","affiliation":[{"name":"Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India"}]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Brandon University,Department of Mathematics and Computer Science,Manitoba,Canada"}]},{"given":"Thippa Reddy","family":"Gadekallu","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Zhejiang A&#x0026;F University,Hangzhou,China,311300"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3446489"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16843-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101845"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.04.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNEA50255.2020.00040"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICICEC62498.2024.10808445"},{"key":"ref7","first-page":"46","article-title":"Robust secure svd based dct-dwt oriented watermarking technique for image authentication","volume-title":"International Conference on IT to celebrate S. Charmonman\u2019 s 72nd birthday","author":"Bedi"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00468-w"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3009349"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.12.224"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4109-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIE.2010.5735066"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3661309"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3030671"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/ijett-v69i11p213"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2016100104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2017.95"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5120\/3537-4836"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp28-38"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp1-12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IEMECON56962.2023.10092311"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/icdsis61070.2024.10594413"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.22606\/fsp.2020.41006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3420688"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp13-27"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp39-47"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12020415"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.07.051"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331506.pdf?arnumber=11331506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:38:45Z","timestamp":1768981125000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331506","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}