{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:57:44Z","timestamp":1729630664402,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856659","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"27-32","source":"Crossref","is-referenced-by-count":2,"title":["A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack"],"prefix":"10.1109","author":[{"given":"Cynthia Lizbeth","family":"Guzman-Candelario","sequence":"first","affiliation":[]},{"given":"Jose Juan","family":"Garcia-Hernandez","sequence":"additional","affiliation":[]},{"given":"Loreto","family":"Gonzalez-Hernandez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.3.1.7-15"},{"key":"ref11","first-page":"189","article-title":"A robust digital image watermarking scheme using hybrid dwt-dct-svd technique","volume":"10","author":"murty","year":"2010","journal-title":"Int J Comput Sci Netw Security"},{"key":"ref12","first-page":"167","article-title":"An oblivious image watermarking scheme using multiple description coding and genetic algorithm","volume":"10","author":"ramanjaneyulu","year":"2010","journal-title":"Int J Comput Sci Netw Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5120\/7821-0998"},{"key":"ref14","first-page":"190","article-title":"Robust invisible qr code image watermarking in dwt domain","volume":"4","author":"jithin","year":"2013","journal-title":"International Journal of Electronics and Communication Engineering & Technology"},{"key":"ref15","first-page":"74","article-title":"Robust invisible qr code image watermarking algorithm in swt domain","volume":"2","author":"swathi","year":"0","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICTKE.2012.6152412"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855407"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1117\/12.526586","article-title":"Adaptive quantization watermarking","volume":"5306","author":"oostven","year":"2004","journal-title":"Proc SPIE Security Steganography Watermarking Multimedia Contents"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2009.03.011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref6","article-title":"Developing an efficient digital image watermarking for smartphones","author":"al-gahtani","year":"2011","journal-title":"IEEE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSP.2013.6526885"},{"journal-title":"ISO\/IEC 18004 2000","article-title":"Information technology-automatic identification and data capture techniques-bar code symbology-qr code","year":"2000","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2008.4597299"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCA.2012.6179231"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGEC.2012.62"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CICT.2015.74"},{"key":"ref20","article-title":"Statistical analysis of image quality measures","author":"ismail avcibas","year":"1999","journal-title":"Department of Electrical and Electronic Engineering Bogazici University"},{"journal-title":"Digital Image Processing","year":"2008","author":"gonzalez","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856659.pdf?arnumber=7856659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:53:06Z","timestamp":1568836386000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856659","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}