{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:01:32Z","timestamp":1729609292151,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ic3.2015.7346646","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:17:05Z","timestamp":1449613025000},"page":"19-24","source":"Crossref","is-referenced-by-count":1,"title":["Gray scale image watermarking using fuzzy entropy and Lagrangian twin SVR in DCT domain"],"prefix":"10.1109","author":[{"family":"Ashok Kumar Yadav","sequence":"first","affiliation":[]},{"given":"Rajesh","family":"Mehta","sequence":"additional","affiliation":[]},{"given":"Raj","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Digital Image Processing Using Matlab","year":"2005","author":"gonalez","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2010.2096209"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2013.6612183"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP.2013.6707612"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0329-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0331-z"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(98)00148-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.20"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2009.347"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.802512"},{"journal-title":"Digital Watermarking","year":"2001","author":"cox","key":"ref3"},{"key":"ref6","first-page":"505","article-title":"A digital watermarking scheme using human visual effects","volume":"24","author":"chang","year":"2000","journal-title":"Informatica"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00017-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-012-0072-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.808816"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1117\/12.344672","article-title":"A fair benchmark image watermarking system","volume":"3657","author":"kutter","year":"1999","journal-title":"Proc Electronic Imaging 99 Security and Watermarking of Multimedia Contents"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0971-9"}],"event":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2015,8,20]]},"location":"Noida, India","end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 Eighth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337021\/7346637\/07346646.pdf?arnumber=7346646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:17:30Z","timestamp":1602685050000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7346646"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ic3.2015.7346646","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}