{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:22:13Z","timestamp":1730272933715,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscisc.2016.7736448","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T16:27:30Z","timestamp":1478536050000},"page":"32-37","source":"Crossref","is-referenced-by-count":1,"title":["Feature extraction for detection of watermarking algorithm"],"prefix":"10.1109","author":[{"given":"Zahra","family":"Hatefi","sequence":"first","affiliation":[]},{"given":"Mojtaba","family":"Mahdavi","sequence":"additional","affiliation":[]},{"given":"Pegah","family":"Nikbakht","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Steganalysis in high dimensions: Fusing classifiers built on random subspaces","author":"kodovsk\u00fd","year":"2011","journal-title":"Proc SPIE 7880 Media Watermarking Security and Forensics III"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2037252.2037267"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.10.047"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2013.03.013"},{"article-title":"SoW: a hybrid DWT-SVD based secured image watermarking","year":"0","author":"zhou","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2066770"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2014.03.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69304-8_10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2015.7288669"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2015.7365855"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84927-0_27"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73742-3_13"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIS.2011.041362"},{"key":"ref1","article-title":"A Survey of Digital Watermarking Techniques, Applications and Attacks","volume":"2","author":"singh","year":"2013","journal-title":"International Journal of Engineering and Innovative Technology (IJEIT)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12827-1_25"}],"event":{"name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2016,9,7]]},"location":"Tehran","end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7604981\/7736436\/07736448.pdf?arnumber=7736448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T17:43:15Z","timestamp":1485193395000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7736448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2016.7736448","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}