{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T22:37:20Z","timestamp":1768689440642,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icccnt49239.2020.9225668","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T20:00:38Z","timestamp":1602792038000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Image Segmentation Based Hybrid Watermarking Algorithm for Copyright Protection"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8578-7126","authenticated-orcid":false,"given":"Y.","family":"Bhavani","sequence":"first","affiliation":[]},{"given":"Sai Srikar","family":"Puppala","sequence":"additional","affiliation":[]},{"given":"Spoorthy Shivani","family":"Pabba","sequence":"additional","affiliation":[]},{"given":"Kavya Sri","family":"Kasarla","sequence":"additional","affiliation":[]},{"given":"Kadipaka","family":"Anvitha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5413531"},{"key":"ref11","volume":"16","author":"fatimah","year":"2012","journal-title":"Robust Digital Watermarking Technique for Satellite Images"},{"key":"ref12","author":"hanna","year":"2014","journal-title":"Homomorphic image watermarking with a singular value decomposition algorithm"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2014.6921728"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2017.8286758"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2010.5591586"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2012.6469828"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2015.7322663"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2017.8212832"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766644"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF.2015.7049879"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TELSKS.2003.1246248"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"liu","year":"2002","journal-title":"IEEE Transactions on Multimedia"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2019.8698057"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2066770"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014025"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.678149"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2009.2021946"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-019-0462-3"}],"event":{"name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","location":"Kharagpur, India","start":{"date-parts":[[2020,7,1]]},"end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9211590\/9225262\/09225668.pdf?arnumber=9225668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:09:26Z","timestamp":1656374966000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225668\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccnt49239.2020.9225668","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}