{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:53Z","timestamp":1750221113491,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T00:00:00Z","timestamp":1545091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,18]]},"DOI":"10.1145\/3293353.3293433","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T22:07:32Z","timestamp":1588630052000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Chaos Based Robust and Secure Image Hashing Framework"],"prefix":"10.1145","author":[{"given":"Satendra Pal","family":"Singh","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Jodhpur, India"}]},{"given":"Gaurav","family":"Bhatnagar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Jodhpur, India"}]}],"member":"320","published-online":{"date-parts":[[2020,5,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.03.006"},{"key":"e_1_3_2_1_2_1","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"Katzenbeisser S.","year":"2002","unstructured":"S. Katzenbeisser and F. A.P. Petitcolas , Information hiding techniques for steganography and digital watermarking , Artech House , Boston , 2002 . S. Katzenbeisser and F.A.P. Petitcolas, Information hiding techniques for steganography and digital watermarking, Artech House, Boston, 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2107-7_40"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA.2018.8368701"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA.2018.8368700"},{"key":"e_1_3_2_1_6_1","first-page":"55","volume-title":"Robust hashing for image authentication using Zernike moments and local features","author":"Zhao Y.","year":"2013","unstructured":"Y. Zhao , S. Wang , X. Zhang and H. Yao , Robust hashing for image authentication using Zernike moments and local features , IEEE transactions on information forensics and security, 8(1), pp. 55 -- 63 , 2013 . Y. Zhao, S. Wang, X. Zhang and H. Yao, Robust hashing for image authentication using Zernike moments and local features, IEEE transactions on information forensics and security, 8(1), pp. 55--63, 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2000.844203"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv079"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863502"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873601"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2485163"},{"key":"e_1_3_2_1_14_1","article-title":"Robust Image Hashing with Tensor Decomposition","author":"Tang Z.","year":"2018","unstructured":"Z. Tang , L. Chen , X. Zhang and S. Zhang , Robust Image Hashing with Tensor Decomposition , IEEE Transactions on Knowledge and Data Engineering , 2018 . Z. Tang, L. Chen, X. Zhang and S. Zhang, Robust Image Hashing with Tensor Decomposition, IEEE Transactions on Knowledge and Data Engineering, 2018.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIPA.2017.8120651"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-2789(01)00325-6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.02.005"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1976.1162766"},{"key":"e_1_3_2_1_19_1","first-page":"90","volume-title":"Discrete cosine transform","author":"Ahmed N.","year":"1974","unstructured":"N. Ahmed , T. Natarajan and K.R. Rao , Discrete cosine transform , IEEE transactions on Computers 100(1), pp. 90 -- 93 , 1974 . N. Ahmed, T. Natarajan and K.R. Rao, Discrete cosine transform, IEEE transactions on Computers 100(1), pp. 90--93, 1974."}],"event":{"name":"ICVGIP 2018: 11th Indian Conference on Computer Vision, Graphics and Image Processing","acronym":"ICVGIP 2018","location":"Hyderabad India"},"container-title":["Proceedings of the 11th Indian Conference on Computer Vision, Graphics and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293353.3293433","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3293353.3293433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:01Z","timestamp":1750208521000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293353.3293433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,18]]},"references-count":19,"alternative-id":["10.1145\/3293353.3293433","10.1145\/3293353"],"URL":"https:\/\/doi.org\/10.1145\/3293353.3293433","relation":{},"subject":[],"published":{"date-parts":[[2018,12,18]]},"assertion":[{"value":"2020-05-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}