{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:25Z","timestamp":1750221265709,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,25]]},"DOI":"10.1145\/3133264.3133282","type":"proceedings-article","created":{"date-parts":[[2017,10,6]],"date-time":"2017-10-06T12:48:47Z","timestamp":1507294127000},"page":"72-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Generation of Meaningfully Secured Images for Copyright- and Privacy-Protected Image Trading Systems Using Singular Component Interchange"],"prefix":"10.1145","author":[{"given":"Wannida","family":"Sae-Tang","sequence":"first","affiliation":[{"name":"The Sirindhorn International, Thai-German Graduate School of Engineering, King Mongkut's University of Technology North Bangkok, Bangkok, Thailand"}]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[{"name":"The Graduate School of System Design, Tokyo Metropolitan University, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"protocols, algorithms, and source code in C","author":"Schneier B.","year":"1996","unstructured":"Schneier , B. \" Applied cryptography : protocols, algorithms, and source code in C ,\" 2 nd ed., John Wiley & Sons , 1996 . Schneier, B. \"Applied cryptography: protocols, algorithms, and source code in C,\" 2nd ed., John Wiley & Sons, 1996.","edition":"2"},{"key":"e_1_3_2_1_2_1","first-page":"15","article-title":"A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking","volume":"1","author":"Sengoku Y.","year":"2012","unstructured":"Sengoku , Y. and Hioki , H . \" A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking ,\" Proc. ITC-CSCC, D-W 1-02 , Sapporo, Japan, 15 - 18 Jul. 2012 . Sengoku, Y. and Hioki, H. \"A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking,\" Proc. ITC-CSCC, D-W1-02, Sapporo, Japan, 15-18 Jul. 2012.","journal-title":"Proc. ITC-CSCC, D-W"},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE CCNC","author":"Okada M.","year":"2010","unstructured":"Okada , M. , Okabe , Y. , and Uehara , T . \" A webbased privacy-secure content trading system for small content providers using semi-blind digital watermarking,\" Proc . IEEE CCNC , 2010 . Okada, M., Okabe, Y., and Uehara, T. \"A webbased privacy-secure content trading system for small content providers using semi-blind digital watermarking,\" Proc. IEEE CCNC, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1587\/transfun.E96.A.1245"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1587\/transfun.E96.A.1323"},{"volume-title":"1D frequency transformation-based amplitude-only images for copyright- and privacy-protection in image trading systems,\" ECTI-CIT","author":"Sae-Tang W.","unstructured":"Sae-Tang , W. , Liu , S. , Fujiyoshi , M. , and Kiya , H . \" 1D frequency transformation-based amplitude-only images for copyright- and privacy-protection in image trading systems,\" ECTI-CIT , vol. 8 , no. 2, Nov. 2014. Sae-Tang, W., Liu, S., Fujiyoshi, M., and Kiya, H. \"1D frequency transformation-based amplitude-only images for copyright- and privacy-protection in image trading systems,\" ECTI-CIT, vol. 8, no. 2, Nov. 2014.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"crossref","unstructured":"Sae-Tang W. \"A copyright- and privacy-protected diabetic retinopathy diagnosis network \" ECTI-CIT vol. 10 no. 2 Nov. 2016.  Sae-Tang W. \"A copyright- and privacy-protected diabetic retinopathy diagnosis network \" ECTI-CIT vol. 10 no. 2 Nov. 2016.","key":"e_1_3_2_1_7_1","DOI":"10.37936\/ecti-cit.2016102.75142"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/978-981-10-2471-9_2"}],"event":{"sponsor":["Sultan Qaboos University Sultan Qaboos University","USM Universiti Sains Malaysia"],"acronym":"ICAIP 2017","name":"ICAIP 2017: 2017 International Conference on Advances in Image Processing","location":"Bangkok Thailand"},"container-title":["Proceedings of the International Conference on Advances in Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133264.3133282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133264.3133282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:59Z","timestamp":1750212659000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133264.3133282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,25]]},"references-count":8,"alternative-id":["10.1145\/3133264.3133282","10.1145\/3133264"],"URL":"https:\/\/doi.org\/10.1145\/3133264.3133282","relation":{},"subject":[],"published":{"date-parts":[[2017,8,25]]},"assertion":[{"value":"2017-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}