{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:46:00Z","timestamp":1762004760788,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/ssd.2015.7348112","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:14:24Z","timestamp":1449612864000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Digital images watermarking and partial encryption based on DWT transformation and chaotic maps"],"prefix":"10.1109","author":[{"given":"Oussama","family":"Benrhouma","sequence":"first","affiliation":[]},{"given":"Olfa","family":"Mannai","sequence":"additional","affiliation":[]},{"given":"Houcemeddine","family":"Hermassi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"603","volume":"99","author":"dyson","year":"1992","journal-title":"Period of a discrete cat mapping Am Math Mon"},{"key":"ref11","volume":"564","author":"arnold","year":"0","journal-title":"Ergodic Problems of Classical Mechanics"},{"year":"0","author":"peterson","journal-title":"Arnold's Cat Map","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/s11071-012-0539-3"},{"year":"0","author":"daubechies","journal-title":"Ten Lectures on Wavelets CBMS-NSF Conference Series in Applied Mathematics","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/34.192463"},{"year":"1990","author":"meyer","journal-title":"Ondelettes et oprateurs Vol Tome 1 Hermann Ed","key":"ref16"},{"year":"0","journal-title":"Miscelaneous gray level image 256 &#x00D7; 256 Computer Vision Group University of Granada URL","key":"ref17"},{"key":"ref4","first-page":"403","volume":"365","author":"wu","year":"2007","journal-title":"A novel digital watermark algorithm based on chaotic maps Phys Lett A"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/357744.357893"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.patrec.2005.09.006"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.aeue.2011.01.016"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s11042-009-0433-2"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.optcom.2009.04.034"},{"key":"ref2","first-page":"296","article-title":"A robust image authentication method surving jpeg lossy compression","volume":"3312","author":"lin","year":"1998","journal-title":"Proceeding of SPIE international conference on storage and retrieval of image\/video database"},{"key":"ref1","first-page":"209","article-title":"Content-based digital signature for motion pictures authentication and content-fragile watermarking","author":"bittman","year":"1999","journal-title":"proceeding of IEEE international conference on miltimedia computing systems"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.eswa.2010.07.147"}],"event":{"name":"2015 12th International Multi-Conference on Systems, Signals & Devices (SSD)","start":{"date-parts":[[2015,3,16]]},"location":"Mahdia, Tunisia","end":{"date-parts":[[2015,3,19]]}},"container-title":["2015 IEEE 12th International Multi-Conference on Systems, Signals &amp; Devices (SSD15)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336450\/7348090\/07348112.pdf?arnumber=7348112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:59:07Z","timestamp":1490403547000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7348112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ssd.2015.7348112","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}