{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:26:18Z","timestamp":1730251578271,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/icnc.2014.6975969","type":"proceedings-article","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T16:45:28Z","timestamp":1418229928000},"page":"958-963","source":"Crossref","is-referenced-by-count":1,"title":["Primal sketch based visual entropy model for digital watermarking"],"prefix":"10.1109","author":[{"given":"Yana","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Cheng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"14","DOI":"10.5120\/1712-2293","article-title":"Entropy based Robust Watermarking Scheme using Hadamard Transformation Technique","volume":"12","author":"franklin","year":"2011","journal-title":"International Journal of Computer Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2012.6233868"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SOPO.2012.6270549"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2005.09.004"},{"key":"ref14","article-title":"Primal Sketch Based Adaptive Perceptual JND Model for Digital Watermarking","author":"zhang","year":"2014","journal-title":"The 48th CISS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/83.918570"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2005.1595412"},{"key":"ref3","first-page":"444","article-title":"Robustness enhancement of content-based watermarks using entropy masking effect","author":"amir houman","year":"2005","journal-title":"Digital Watermarking"},{"key":"ref6","first-page":"1","article-title":"Watermarking of Still Images in Wavelet Domain based on Entropy Masking Model","author":"ghaemmaghami","year":"2005","journal-title":"Proc IEEE Region 10 Conf (TENCON)"},{"key":"ref5","article-title":"An Entropy Masking Model for Multimedia Content Watermarking","author":"kim","year":"2004","journal-title":"IEEE International Conference on System Sciences"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SSIAI.2010.5483916"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIPA.2009.5478604"},{"key":"ref2","article-title":"An entropy based technique for information embedding in images","author":"droogenbroeck","year":"2002","journal-title":"Proceedings of the IEEE Signal Processing Symposium (SPS-2002)"},{"key":"ref1","article-title":"Image quality and entropy masking","author":"watson","year":"1997","journal-title":"Proc SPIE Conf Human Vision Visual Processing Digital Display VI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.290"}],"event":{"name":"2014 10th International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2014,8,19]]},"location":"Xiamen","end":{"date-parts":[[2014,8,21]]}},"container-title":["2014 10th International Conference on Natural Computation (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6963214\/6975799\/06975969.pdf?arnumber=6975969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T20:43:04Z","timestamp":1502397784000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6975969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icnc.2014.6975969","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}