{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:05:29Z","timestamp":1773792329209,"version":"3.50.1"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/icecs.2007.4511225","type":"proceedings-article","created":{"date-parts":[[2008,5,5]],"date-time":"2008-05-05T16:21:05Z","timestamp":1210004465000},"page":"1256-1259","source":"Crossref","is-referenced-by-count":6,"title":["Content-Adaptive Semi-Fragile Watermarking for Image Authentication"],"prefix":"10.1109","author":[{"given":"Mohammed E.","family":"Al-Mualla","sequence":"first","affiliation":[{"name":"Multimedia Communication and Signal Processing (MCSP) Group, Etisalat University College, P.O.Box: 573, Sharjah, United Arab Emirates. Tel: +971 6 5611333, Fax: +971 6 5611789, email: almualla@ece.ac.ae"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2004.1433744"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/5.771070"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1117\/12.344670","article-title":"Fragile watermarking using the VW2D watermark","volume":"3657","author":"wolfgang","year":"1999","journal-title":"Proc SPIE Conf Security and Watermarking of Multimedia Contents"},{"key":"ref8","author":"gonzalez","year":"2001","journal-title":"Digital Image Processing"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1117\/12.384969","article-title":"Detection of image alterations using semi-fragile watermarks","volume":"3971","author":"lin","year":"2000","journal-title":"Proc SPIE Security Watermarking Multimedia Contents II"},{"key":"ref2","author":"cox","year":"2002","journal-title":"Digital Watermarking Principles and Practice"},{"key":"ref1","author":"katzenbeisser","year":"2000","journal-title":"Information Hiding Techniques for Steganography and Watermarking"}],"event":{"name":"2007 14th IEEE International Conference on Electronics, Circuits and Systems","location":"Marrakech, Morocco","start":{"date-parts":[[2007,12,11]]},"end":{"date-parts":[[2007,12,14]]}},"container-title":["2007 14th IEEE International Conference on Electronics, Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4456901\/4510892\/04511225.pdf?arnumber=4511225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:21:04Z","timestamp":1773778864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4511225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/icecs.2007.4511225","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}