{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:05:28Z","timestamp":1773792328771,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/icecs.2007.4511047","type":"proceedings-article","created":{"date-parts":[[2008,5,5]],"date-time":"2008-05-05T16:21:05Z","timestamp":1210004465000},"page":"538-541","source":"Crossref","is-referenced-by-count":9,"title":["A New Blind Image Watermarking Technique for Dual Watermarks Using Low-Frequency Band DCT Coefficients"],"prefix":"10.1109","author":[{"given":"Ahmed N.","family":"Al-Gindy","sequence":"first","affiliation":[{"name":"Electrical Engineering Department, Ajman University of Science & Technology, UAE"}]},{"given":"Ayman","family":"Tawfik","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Ajman University of Science & Technology, UAE"}]},{"given":"Hussain","family":"Al Ahmad","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Etisalat University College, UAE"}]},{"given":"Rami A.","family":"Qahwaji","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Bradford, UK"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/49.668979"},{"key":"ref3","article-title":"A review of watermarking and the importance of perceptual modeling","author":"cox","year":"1997","journal-title":"SPIE Electronic Imaging 97 storage and Retrieval for image and video Databases V"},{"key":"ref10","article-title":"A Novel Technique for Robust Image Watermarking in the DCT Domain","author":"deng","year":"2003","journal-title":"IEEE Int Conf Neural Networks & Signal Processing"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/ICIP.1996.560424","article-title":"Hidden signatures in images","volume":"3","author":"hsu","year":"1996","journal-title":"ICIP-96 IEEE Int Conf Image Processing"},{"key":"ref11","first-page":"450","article-title":"Enhanced DCT Based Technique with Shuffle Scheme For Robust Image Watermarking of Handwritten Signatures","author":"al-gindy","year":"2007","journal-title":"ICCCP '07 International Conference for Communication Computer and Power"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1049\/cp:19950674","article-title":"watermarking digital images for copyright protection","author":"boland","year":"1995","journal-title":"Fifth International Conference on Image Processing and its Applications (Conf Publ No 410)"},{"key":"ref8","first-page":"302","article-title":"2 D Walsh Coding for Robust Digital Image Watermarking","author":"ben sewaif","year":"2004","journal-title":"The 4th IEEE International Symposium on Signal Processing and Information Technology"},{"key":"ref7","first-page":"431","article-title":"Walsh-Coded Signatures for Robust Digital Image Watermarking","author":"ben sewaif","year":"2004","journal-title":"The 2004 IEEE Region 10 Conference - Analog and Digital Techniques in Electrical Engineering (TENCON2004)"},{"key":"ref2","author":"katzenbeisser","year":"2000","journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking"},{"key":"ref9","first-page":"228","article-title":"Robust Image Watermarking on DCT Domain","author":"lie","year":"2000","journal-title":"ISCAS 2000- IEEE Int Symposium on Circuits and Systems"},{"key":"ref1","first-page":"1","article-title":"An introduction to watermark recovery from images","author":"johnson","year":"1999","journal-title":"SANS Intrusion Detection and Response Conference (IDR"}],"event":{"name":"2007 14th IEEE International Conference on Electronics, Circuits and Systems","location":"Marrakech, Morocco","start":{"date-parts":[[2007,12,11]]},"end":{"date-parts":[[2007,12,14]]}},"container-title":["2007 14th IEEE International Conference on Electronics, Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4456901\/4510892\/04511047.pdf?arnumber=4511047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:21:04Z","timestamp":1773778864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4511047\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icecs.2007.4511047","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}