{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:01:04Z","timestamp":1762506064536,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/isda.2012.6416619","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T22:50:06Z","timestamp":1359586206000},"page":"680-685","source":"Crossref","is-referenced-by-count":33,"title":["DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal"],"prefix":"10.1109","author":[{"given":"Nilanjan","family":"Dey","sequence":"first","affiliation":[]},{"given":"Debalina","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Anamitra Bardhan","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Achintya","family":"Das","sequence":"additional","affiliation":[]},{"given":"Sheli Sinha","family":"Chaudhuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"year":"0","key":"14"},{"key":"11","first-page":"104","article-title":"A Digital Watermarking Algorithm Based on DCT and DWT","author":"mei","year":"0","journal-title":"Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA'09) Nanchang P R China May 22-24 2009"},{"year":"0","key":"12"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"2","first-page":"9","article-title":"Digital watermarking: An overview","author":"voyatzis","year":"1998","journal-title":"Signal Processing IX Theories and Applications Proceedings of Eusipco-98 Ninth European Signal Processing Conference Rhodes Greece 8-11 September 1998"},{"key":"1","first-page":"613","article-title":"A Survey of Watermarking Algorithms for Image Authentication","volume":"2002","author":"rey","year":"2002","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"10","article-title":"A Session based Multiple Image Hiding Technique using DWT and DCT","volume":"38","author":"dey","year":"2012","journal-title":"International Journal of Computer Applications"},{"year":"0","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/SIEDS.2007.4373994"},{"key":"5","article-title":"Electrooculogram based Instrumentation and Control System (IC System) and its Applications for Severely Paralysed Patients","author":"rajan","year":"0","journal-title":"ICBPE 2006"},{"key":"4","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1155\/S1110865702204047","article-title":"A Survey of Watermarking Algorithms for Image Authentication","volume":"2002","author":"rey","year":"2002","journal-title":"EURASIP Journal on Applied Signal Processing"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICCIC.2012.6510173"},{"year":"0","key":"8"}],"event":{"name":"2012 12th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2012,11,27]]},"location":"Kochi, India","end":{"date-parts":[[2012,11,29]]}},"container-title":["2012 12th International Conference on Intelligent Systems Design and Applications (ISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6409495\/6416502\/06416619.pdf?arnumber=6416619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:42:07Z","timestamp":1498027327000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6416619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isda.2012.6416619","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}