{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:09:19Z","timestamp":1730236159822,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866744","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:12:11Z","timestamp":1406754731000},"page":"1-4","source":"Crossref","is-referenced-by-count":10,"title":["Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain"],"prefix":"10.1109","author":[{"given":"Radu Ovidiu","family":"Preda","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1005","volume":"5856","author":"cruz-ramos","year":"2009","journal-title":"Image Authentication Scheme Based on Self-embedding Watermarking"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2009.5383118"},{"key":"18","first-page":"26","article-title":"Image authentication and recovery using BCH error-correcting codes","volume":"5","author":"mendoza-noriega","year":"2011","journal-title":"International Journal of Computers"},{"key":"15","first-page":"24","article-title":"Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography","author":"riaz","year":"2013","journal-title":"International Conference on Advanced Communication Technology (ICACT)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2009.12.003"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2013.55"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2013.6567315"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1117\/1.2712445"},{"key":"12","first-page":"627","article-title":"Perceptible content retrieval in DCT domain and semi-fragil watermarking techniques for perceptible content authentication","volume":"4","author":"atupelage","year":"2008","journal-title":"WSEAS Transactions on Signal Processing"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2013.0048"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2013.0055"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0059"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1117\/12.2030993"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1117\/1.3609010"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2010.07.009"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1117\/1.3558734"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2012.07.010"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1117\/1.3660316"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","start":{"date-parts":[[2014,5,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866744.pdf?arnumber=6866744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:21:21Z","timestamp":1490300481000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866744\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866744","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}