{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:35:40Z","timestamp":1775324140195,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100019031","name":"Science and Technology Innovation Key Research and Development Program of Chongqing","doi-asserted-by":"publisher","award":["CSTB2023TIAD-STX0030"],"award-info":[{"award-number":["CSTB2023TIAD-STX0030"]}],"id":[{"id":"10.13039\/501100019031","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372075"],"award-info":[{"award-number":["62372075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20211357"],"award-info":[{"award-number":["BK20211357"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Science and Technology Program","award":["2023YFQ0029"],"award-info":[{"award-number":["2023YFQ0029"]}]},{"name":"Sichuan Science and Technology Program","award":["2023YFQ0028"],"award-info":[{"award-number":["2023YFQ0028"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tce.2024.3474744","type":"journal-article","created":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T17:44:13Z","timestamp":1728323053000},"page":"6533-6546","source":"Crossref","is-referenced-by-count":4,"title":["Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5825-2241","authenticated-orcid":false,"given":"Chunqiang","family":"Hu","sequence":"first","affiliation":[{"name":"School of Big Data and Software Engineering and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"}]},{"given":"Feihong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0381-1389","authenticated-orcid":false,"given":"Xiaoshuang","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Changshu Institute of Technology, Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1379-6314","authenticated-orcid":false,"given":"Hang","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, The Catholic University of America, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-4623","authenticated-orcid":false,"given":"Tao","family":"Xiang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7326-5796","authenticated-orcid":false,"given":"Hui","family":"Xia","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Ocean University of China, Qingdao, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2022.3227401"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3285626"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NEWCAS.2018.8585506"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.05.024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2021.1956023"},{"issue":"10","key":"ref7","first-page":"9822","article-title":"Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic","volume":"34","author":"Jana","year":"2022","journal-title":"J. King Saud Univ., Comput. Inf. Sci."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2190388"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3324430"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0862"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3151359"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2011.04.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.065"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1188-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3161149"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy047"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.45"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3047142"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5772\/37435"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2016.09.003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2015.03.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594136"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2485163"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/UPCON.2016.7894703"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6115-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240690"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2018.5661"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2016.7765393"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2496-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2688-0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908029"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2022.102268"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv079"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2014.7238385"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4809-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.857263"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10766-5_7"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-Based Cryptography: Theory, Algorithms and Applications","volume":"354","author":"Kocarev","year":"2011"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3286487"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057692"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/34.491618"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5614\/itbj.ict.res.appl.2019.13.2.4"},{"key":"ref43","first-page":"639","volume-title":"Digital Image Processing","author":"Gonzalez","year":"2018"},{"key":"ref44","volume-title":"The USC-SIPI image database version 5","author":"Weber","year":"1997"},{"key":"ref45","volume-title":"INRIA copydays database","year":"2021"},{"key":"ref46","volume-title":"CVG-UGR image database","year":"2021"},{"key":"ref47","volume-title":"RAISE database","year":"2021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09174-0"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2921652"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/10820880\/10706100.pdf?arnumber=10706100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T19:49:06Z","timestamp":1736884146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10706100\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":49,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tce.2024.3474744","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}