{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T17:42:46Z","timestamp":1730310166475,"version":"3.28.0"},"reference-count":41,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3,15]]},"DOI":"10.1117\/12.2523482","type":"proceedings-article","created":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T11:53:10Z","timestamp":1552737190000},"page":"116","source":"Crossref","is-referenced-by-count":2,"title":["A watermarking scheme based on DCT, SVD and BCM"],"prefix":"10.1117","author":[{"given":"Houda","family":"Souden","sequence":"first","affiliation":[]},{"given":"Ridha","family":"Ejbali","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Zaied","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2017.07.020"},{"key":"c2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT.2018.8350793"},{"key":"c3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.07.234"},{"issue":"9","key":"c4","article-title":"Robust and Secure Image Watermarking using DWT-SVD and Chaotic Map","volume":"4","author":"Singh","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"c5","doi-asserted-by":"publisher","DOI":"10.1109\/CCI.2016.7778945"},{"key":"c6","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE.2016.7939559"},{"key":"c7","article-title":"A Chaotic Watermarking Scheme using Discrete Cosine Transform","volume-title":"12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","author":"Somayyeh","year":"2015"},{"key":"c8","article-title":"Secure and Robust Watermarking Algorithm Based on the Combination of DWT, SVD, and LU Decomposition with Arnold\u2019s Cat Map Approach","volume-title":"8th International Conference on Electrical and Electronics Engineering (ELECO)","author":"Onur","year":"2013"},{"key":"c9","article-title":"A Blind Digital Watermark Method Based on SVD and Chaos","author":"Jianhua","year":"2012","journal-title":"International Workshop on Information and Electronics Engineering."},{"key":"c10","article-title":"Digital Image Watermarking Scheme in Wavelet Domain Using Chaotic Encryption","volume-title":"Students Conference on Engineering and Systems.","author":"Priyank","year":"2014"},{"key":"c11","article-title":"DWT\/DCT Watermarking Techniques with Chaotic Map for Video Authentication","volume-title":"Ninth International Conference on Digital Image Processing (ICDIP 2017)","author":"Jantana","year":"2017"},{"key":"c12","article-title":"Some Improvements to Logistic Map for Chaotic Signal Generator","volume-title":"3rd IEEE International Conference on Computer and Communications","author":"Jian","year":"2017"},{"key":"c13","first-page":"39","article-title":"Image encryption based on new Beta chaotic maps","volume":"69","author":"Rim","year":"2017","journal-title":"Optics and Lasers in Engineering."},{"key":"c14","first-page":"6429","article-title":"A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps","volume":"5","author":"Xiaolin","year":"2017","journal-title":"IEEE Access"},{"key":"c15","article-title":"A Comparative Analysis of Invisible Image Watermarking Techniques","volume-title":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","author":"Smit","year":"2016"},{"key":"c16","article-title":"Image cryptography using Discrete Haar Wavelet transform and Arnold Cat Map","volume-title":"2015 International Conference on Communications and Signal Processing (ICCSP)","author":"Mahita","year":"2015"},{"key":"c17","article-title":"Toward new family beta maps for chaotic image encryption","volume-title":"IEEE International Conference on Systems, Man, and Cybernetics SMC.","author":"Rim","year":"2016"},{"key":"c18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5222-8"},{"key":"c19","article-title":"A new beta chaotic watermarking scheme based on DWT and SVD","volume-title":"The 2018 International Conference on High Performance Computing & Simulation (HPCS 2018)","author":"Houda","year":"2018"},{"key":"c20","first-page":"2042","article-title":"A Secure Non-blind Block Based Digital Image Watermarking Technique Using DWT and DCT","author":"Arya","year":"2015","journal-title":"IEEE ICACCI"},{"key":"c21","doi-asserted-by":"crossref","unstructured":"Ines Teyeb, Olfa Jemai, Mourad Zaied, Chokri Ben Amar, \u201cA novel approach for drowsy driver detection using head posture estimation and eyes recognition system based on wavelet network\u201d, International Conference on Information, Intelligence, Systems and Applications, pp:379\u2013384, 2014.","DOI":"10.1109\/IISA.2014.6878809"},{"key":"c22","first-page":"1","article-title":"Learning wavelet networks based on Multiresolution analysis: Application to images copy detection","volume-title":"International Conference on Communications, Computing and Control Applications","author":"Asma","year":"2011"},{"key":"c23","first-page":"944503","article-title":"A speech recognition system based on hybrid wavelet network including a fuzzy decision support system","volume-title":"International Conference on Machine Vision","volume":"9445","author":"Olfa","year":"2014"},{"issue":"4","key":"c24","article-title":"Multi-input Multi-output Beta Wavelet Network: Modeling of Acoustic Units for Speech Recognition","volume":"3","author":"Ridha","year":"2012","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"c25","first-page":"362","article-title":"A drowsy driver detection system based on a new method of head posture estimation","volume-title":"International Conference on Intelligent Data Engineering and Automated Learning","author":"Ines","year":"2014"},{"key":"c26","first-page":"518","article-title":"Intelligent approach to train wavelet networks for Recognition System of Arabic Words","volume-title":"International Conference on Knowledge Discovery and Information Retrieval","author":"Ridha","year":"2010"},{"key":"c27","article-title":"A power tool for Content-based image retrieval using multiresolution wavelet network modeling and Dynamic histograms","author":"Mourad","year":"2012","journal-title":"International REview on Computers and Software"},{"key":"c28","first-page":"201","article-title":"La fonction Beta et ses d\u00e9riv\u00e9es: vers une nouvelle famille d\u2019ondelettes","author":"Bellil","year":"2004"},{"key":"c29","first-page":"781","article-title":"A hybrid approach for Content-Based Image Retrieval based on Fast Beta Wavelet network and fuzzy decision support system","volume":"27","author":"Asma","year":"2016"},{"key":"c30","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2016.V8.1078"},{"key":"c31","first-page":"505","article-title":"GPU-based segmentation of dental x-ray images using active contours without edges","author":"Ramzi","year":"2015","journal-title":"Intelligent Systems Design and Applications"},{"key":"c32","first-page":"1","article-title":"Stacked sparse autoencoder and history of binary motion image for human activity recognition","author":"Mariem","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"c33","first-page":"1","article-title":"Abnormal events\u2019 detection in crowded scenes","author":"Mariem","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"c34","first-page":"5443","article-title":"A deep stacked wavelet auto-encoders to supervised feature extraction to pattern classification","author":"Salima","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"c35","first-page":"117","article-title":"An efficient deployment approach for improved coverage in wireless sensor networks based on flower pollination algorithm","author":"Faten","year":"2016","journal-title":"GRAPH-HOC"},{"key":"c36","first-page":"88","article-title":"Face recognition based on Beta 2D Elastic Bunch Graph Matching","volume-title":"International Conference on Hybrid Intelligent Systems","author":"Ridha","year":"2013"},{"key":"c37","first-page":"236","article-title":"Detection and classification of dental caries in x-ray images using deep neural networks","volume-title":"International Confonference on Software Engineering Advances","author":"Ramzi Ben","year":"2016"},{"key":"c38","first-page":"1","article-title":"A dyadic multi-resolution deep convolutional neural wavelet network for image classification","author":"Ridha","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"c39","first-page":"196","article-title":"Unsupervised Features Extraction Using a Multi-view Self Organizing Map for Image Classification","volume-title":"International conference on Computer Systems and Applications","author":"Fatma Ben","year":"2017"},{"key":"c40","first-page":"103412L","article-title":"Deep SOMs for automated feature extraction and classification from big data streaming","volume-title":"Ninth International Conference on Machine Vision","author":"Mohamed","year":"2017"},{"key":"c41","first-page":"265","article-title":"Supervised image classification using deep convolutional wavelets network","volume-title":"International Conference on Tools with Artificial","author":"Salima","year":"2015"}],"event":{"name":"Eleventh International Conference on Machine Vision","start":{"date-parts":[[2018,11,1]]},"location":"Munich, Germany","end":{"date-parts":[[2018,11,3]]}},"container-title":["Eleventh International Conference on Machine Vision (ICMV 2018)"],"original-title":[],"deposited":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T00:42:51Z","timestamp":1554424971000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.spiedigitallibrary.org\/conference-proceedings-of-spie\/11041\/2523482\/A-watermarking-scheme-based-on-DCT-SVD-and-BCM\/10.1117\/12.2523482.full"}},"subtitle":[],"editor":[{"given":"Dmitry P.","family":"Nikolaev","sequence":"additional","affiliation":[]},{"given":"Petia","family":"Radeva","sequence":"additional","affiliation":[]},{"given":"Antanas","family":"Verikas","sequence":"additional","affiliation":[]},{"given":"Jianhong","family":"Zhou","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,3,15]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1117\/12.2523482","relation":{},"subject":[],"published":{"date-parts":[[2019,3,15]]}}}