{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T04:28:28Z","timestamp":1774326508272,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/ssd.2018.8570457","type":"proceedings-article","created":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T20:25:04Z","timestamp":1544646304000},"page":"12-16","source":"Crossref","is-referenced-by-count":14,"title":["A Secure Energy-Aware Adaptive Watermarking System for Wireless Image Sensor Networks"],"prefix":"10.1109","author":[{"given":"Hamzah A.","family":"Yaseen","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Alsalamin","sequence":"additional","affiliation":[]},{"given":"Abdallah","family":"Jarwan","sequence":"additional","affiliation":[]},{"given":"Mamoun F.","family":"Al-Mistarihi","sequence":"additional","affiliation":[]},{"given":"Khalid A.","family":"Darabkh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.5755\/j01.itc.46.1.15253","article-title":"A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB","volume":"46","author":"darabkh","year":"2017","journal-title":"information technology and control"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.44.3.8949"},{"key":"ref33","first-page":"167","article-title":"Static Clustering for Target Tracking in Wireless Sensor Networks","volume":"8","author":"ismail","year":"2015","journal-title":"Global Journal on Technology (Selected Paper of COMENG-2014)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1898-1"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2068","DOI":"10.1016\/j.jnca.2012.08.008","article-title":"Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks","volume":"35","author":"darabkh","year":"2012","journal-title":"Journal of Network and Computer Applications"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8299826"},{"key":"ref37","article-title":"Block-Based Steganographic Algorithm Using Modulus Function and Pixel-Value Differencing","volume":"10","author":"ahlam","year":"2017","journal-title":"Journal of Software Engineering and Applications"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8299793"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2089-4"},{"key":"ref34","first-page":"479","article-title":"Hierarchical clustering using genetic algorithm in wireless sensor networks","author":"shurman","year":"2013","journal-title":"2013 36th International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO) MIPRO"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCIT.2010.5444857"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2014.710077"},{"key":"ref11","first-page":"217","article-title":"Quality of Service and Performance Evaluation of Congestion Control for Multimedia Networking","author":"darabkh","year":"2006","journal-title":"Proceedings of 2006 International Conference on Internet Computing (ICOMP&#x2018;06)"},{"key":"ref12","first-page":"243","article-title":"Quality of Service Evaluation of Error Control for TCP\/IP-Based Systems in Packet Switching ATM Networks","author":"darabkh","year":"2006","journal-title":"Proceedings of 2006 International Conference on Internet Computing (ICOMP&#x2018;06)"},{"key":"ref13","article-title":"Queueing Simulation for Fano Decoders with Finite Buffer Capacity","author":"darabkh","year":"2006","journal-title":"Proceedings of the 9th Communications and Networking Simulation Symposium Conference (CNSS&#x2018;06)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0698"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2010.485249"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.5.7.551-561"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0115-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2929"},{"key":"ref19","first-page":"1","article-title":"A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks","volume":"2016","author":"mohammed","year":"2016","journal-title":"Journal of Sensors"},{"key":"ref28","article-title":"EA-CRP: A Novel Energy-aware Clustering and Routing Protocol in Wireless Sensor Networks","author":"darabkh","year":"2017","journal-title":"Computers and Electrical Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1857-1"},{"key":"ref27","article-title":"A Reliable Relaying Protocol in Wireless Sensor Networks","author":"darabkh","year":"2017","journal-title":"Proceedings of 2017 IEEE European Conference on Electrical Engineering & Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1888"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/nem.768"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2018.01.032","article-title":"MT -CHR: A Modified Threshold-based Cluster Head Replacement Protocol for Wireless Sensor Networks","author":"darabkh","year":"2018","journal-title":"Computers and Electrical Engineering"},{"key":"ref5","first-page":"365","article-title":"Performance Evaluation of Sequential Decoding System for UDP-Based Systems for Wireless Multimedia Networks","author":"darabkh","year":"2006","journal-title":"Proceedings of the 2006 International Conference on Wireless Networks(ICWN"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2012.6198002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185523"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2012.0410"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.141"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2640"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1401-8"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref22","first-page":"441","article-title":"Merging Dynamic Address Autoconfiguration and Security Key Protocols in Mobile Ad Hoc Networks","author":"shurman","year":"2013","journal-title":"Proceedings of 3 6th IEEE International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO 2013)"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1016\/j.aeue.2015.09.008","article-title":"Dynamic Resource Allocation Using Load Estimation in Distributed Cognitive Radio Systems","volume":"69","author":"mohammed","year":"2015","journal-title":"AEU - International Journal of Electronics and Communications"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv067"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.7305\/automatika.2017.12.1233"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.sigpro.2016.03.023","article-title":"An Efficient Reversible Data Hiding Algorithm Using Two Steganographic Images","volume":"128","author":"iyad","year":"2016","journal-title":"Signal Processing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/348967"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","article-title":"A new chaotic algorithm for image encryption","volume":"29","author":"haojiang","year":"2006","journal-title":"Chaos Solitons & Fractals"},{"key":"ref26","article-title":"A New Cluster Head Replacement Protocol for Wireless Sensor Networks","author":"darabkh","year":"2017","journal-title":"Proceedings of 2017 IEEE European Conference on Electrical Engineering & Computer Science"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0320-6"},{"key":"ref25","first-page":"1","article-title":"LEACH Enhancements for Wireless Sensor Networks Based on Energy Model","author":"mohammad","year":"2014","journal-title":"Proceedings of the 2014 IEEE International Multi-Conference on Systems Signals & Devices Conference on Communication & Signal Processing"}],"event":{"name":"2018 15th International Multi-Conference on Systems, Signals & Devices (SSD)","location":"Hammamet","start":{"date-parts":[[2018,3,19]]},"end":{"date-parts":[[2018,3,22]]}},"container-title":["2018 15th International Multi-Conference on Systems, Signals &amp; Devices (SSD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8546735\/8570358\/08570457.pdf?arnumber=8570457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:39:29Z","timestamp":1598229569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8570457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/ssd.2018.8570457","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}