{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:18Z","timestamp":1750221078464,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301602","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"179-183","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An MD5-Hirose Hashing Algorithm for Digital Image Watermarking"],"prefix":"10.1145","author":[{"given":"Florence Jean B.","family":"Talirongan","sequence":"first","affiliation":[{"name":"Technological Institute of the Philippines, Graduate Program, Quezon City, Philippines"}]},{"given":"Ariel M.","family":"Sison","sequence":"additional","affiliation":[{"name":"School of Computer Studies, Emilio Aguinaldo College, Manila, Philippines"}]},{"given":"Ruji P.","family":"Medina","sequence":"additional","affiliation":[{"name":"Technological Institute of the Philippines, Graduate Program, Quezon City, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2012.11.002"},{"key":"e_1_3_2_1_2_1","volume-title":"et al","author":"Agung A.","year":"2017","unstructured":"Agung , A. et al . 2017 . New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks . 9, 3 (2017), 376--385. Agung, A. et al. 2017. New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks. 9, 3 (2017), 376--385."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.02.002"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2013.53"},{"key":"e_1_3_2_1_5_1","unstructured":"Bhalla J.S. and Nagrath P. 2013. Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm. 3 4 (2013) 1--6.  Bhalla J.S. and Nagrath P. 2013. Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm. 3 4 (2013) 1--6."},{"key":"e_1_3_2_1_6_1","volume-title":"et al","author":"Cao Z.","year":"2010","unstructured":"Cao , Z. et al . 2010 . Image algorithm for watermarking relational databases based on chaos. Lecture Notes in Electrical Engineering . Cao, Z. et al. 2010. Image algorithm for watermarking relational databases based on chaos. Lecture Notes in Electrical Engineering."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.7753\/IJCATR0202.1008"},{"key":"e_1_3_2_1_8_1","volume-title":"et al","author":"Chopra D.","year":"2015","unstructured":"Chopra , D. et al . 2015 . Lsb Based Digital Image Watermarking for Gray Scale Image. July (2015). Chopra, D. et al. 2015. Lsb Based Digital Image Watermarking for Gray Scale Image. July (2015)."},{"key":"e_1_3_2_1_9_1","first-page":"36","article-title":"Lsb Based Digital Image Watermarking For Gray Scale Image","volume":"6","author":"Chopra D.","year":"2012","unstructured":"Chopra , D. 2012 . Lsb Based Digital Image Watermarking For Gray Scale Image . Journal of Computer Engineering. 6 , 1 (2012), 36 -- 41 . Chopra, D. et al. 2012. Lsb Based Digital Image Watermarking For Gray Scale Image. Journal of Computer Engineering. 6, 1 (2012), 36--41.","journal-title":"Journal of Computer Engineering."},{"key":"e_1_3_2_1_10_1","first-page":"48","article-title":"Digital Watermarking","volume":"5","author":"Garg K.","year":"2015","unstructured":"Garg , K. 2015 . Digital Watermarking : Potential Challenges and Issues. 5 , 3 (2015), 48 -- 50 . Garg, K. 2015. Digital Watermarking: Potential Challenges and Issues. 5, 3 (2015), 48--50.","journal-title":"Potential Challenges and Issues."},{"key":"e_1_3_2_1_11_1","volume-title":"2014 International Conference on Computing for Sustainable Global Development, INDIACom","author":"Giri K.J.","year":"2014","unstructured":"Giri , K.J. et al. 2014. A channel wise color image watermarking scheme based on discrete wavelet transformation . 2014 International Conference on Computing for Sustainable Global Development, INDIACom 2014 . Giri, K.J. et al. 2014. A channel wise color image watermarking scheme based on discrete wavelet transformation. 2014 International Conference on Computing for Sustainable Global Development, INDIACom 2014."},{"key":"e_1_3_2_1_12_1","unstructured":"Gishma K.M. and Vareed J. 2016. A Study of Watermarking Relational Databases.  Gishma K.M. and Vareed J. 2016. A Study of Watermarking Relational Databases."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-007-9043-6"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Cryptography based digital image watermarking algorithm to increase security of watermark data","volume":"3","author":"Gupta P.","year":"2012","unstructured":"Gupta , P. 2012 . Cryptography based digital image watermarking algorithm to increase security of watermark data . International Journal of Scientific & Engineering Research. 3 , 9 (2012), 1 -- 4 . Gupta, P. 2012. Cryptography based digital image watermarking algorithm to increase security of watermark data. International Journal of Scientific & Engineering Research. 3, 9 (2012), 1--4.","journal-title":"International Journal of Scientific & Engineering Research."},{"key":"e_1_3_2_1_15_1","unstructured":"Guru J. and Hermant D. 2014. A Review of Watermarking Algorithms for. (2014) 5701--5708.  Guru J. and Hermant D. 2014. A Review of Watermarking Algorithms for. (2014) 5701--5708."},{"key":"e_1_3_2_1_16_1","first-page":"3164","article-title":"Watermarking Techniques for Relational Databases","volume":"16","author":"Halder R.","year":"2010","unstructured":"Halder , R. 2010 . Watermarking Techniques for Relational Databases : Survey, Classification and Comparison. 16 , 21 (2010), 3164 -- 3190 . Halder, R. et al. 2010. Watermarking Techniques for Relational Databases: Survey, Classification and Comparison. 16, 21 (2010), 3164--3190.","journal-title":"Survey, Classification and Comparison."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2008.55"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016.","author":"Indrayani R.","year":"2017","unstructured":"Indrayani , R. et al. 2017. Increasing the security of MP3 steganography using AES Encryption and MD5 hash function . Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016. ( 2017 ), 129--132. Indrayani, R. et al. 2017. Increasing the security of MP3 steganography using AES Encryption and MD5 hash function. Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016. (2017), 129--132."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.6558003"},{"key":"e_1_3_2_1_20_1","volume-title":"et al","author":"Karthigaikumar P.","year":"2012","unstructured":"Karthigaikumar , P. et al . 2012 . FPGA Implementation of High Speed Low Area DWT Based Invisible Image Watermarking Algorithm . Karthigaikumar, P. et al. 2012. FPGA Implementation of High Speed Low Area DWT Based Invisible Image Watermarking Algorithm."},{"key":"e_1_3_2_1_21_1","volume-title":"Data Protection Using Digital Watermarking 1. 2, 12","author":"Kaswan K.K.","year":"2013","unstructured":"Kaswan , K.K. 2013. Data Protection Using Digital Watermarking 1. 2, 12 ( 2013 ), 3405--3410. Kaswan, K.K. 2013. Data Protection Using Digital Watermarking 1. 2, 12 (2013), 3405--3410."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2009.60"},{"key":"e_1_3_2_1_23_1","volume-title":"International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com ISO Certified Journal. 9001, 10","author":"Kumar G.","year":"2015","unstructured":"Kumar , G. 2015. Novel Method for Watermarking Java Program . International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com ISO Certified Journal. 9001, 10 ( 2015 ), 98--101. Kumar, G. 2015. Novel Method for Watermarking Java Program. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com ISO Certified Journal. 9001, 10 (2015), 98--101."},{"key":"e_1_3_2_1_24_1","article-title":"Advanced technique of digital watermarking based on SVD-DWT-DCT and Arnold transform","volume":"2","author":"Madhesiya S.","year":"2013","unstructured":"Madhesiya , S. and Ahmed , S. 2013 . Advanced technique of digital watermarking based on SVD-DWT-DCT and Arnold transform . International Journal of Advanced Research in Computer Engineering & Technology (IJARCET). 2 , 5 (2013), pp--1918. Madhesiya, S. and Ahmed, S. 2013. Advanced technique of digital watermarking based on SVD-DWT-DCT and Arnold transform. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET). 2, 5 (2013), pp--1918.","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)."},{"key":"e_1_3_2_1_25_1","volume-title":"An Overview of Image Security Techiques. 154, 6","author":"Madhu B.","year":"2016","unstructured":"Madhu , B. 2016. An Overview of Image Security Techiques. 154, 6 ( 2016 ), 37--46. Madhu, B. 2016. An Overview of Image Security Techiques. 154, 6 (2016), 37--46."},{"key":"e_1_3_2_1_26_1","first-page":"2069","article-title":"A Survey on Internet of Things: Security and Privacy Issues","volume":"3","author":"Madhura P.M.","year":"2015","unstructured":"Madhura , P.M. 2015 . A Survey on Internet of Things: Security and Privacy Issues . International Journal of Innovative Technology and Research. 3 , 3 (2015), 2069 -- 2074 . Madhura, P.M. et al. 2015. A Survey on Internet of Things: Security and Privacy Issues. International Journal of Innovative Technology and Research. 3, 3 (2015), 2069--2074.","journal-title":"International Journal of Innovative Technology and Research."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080618"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.171"},{"key":"e_1_3_2_1_30_1","volume-title":"et al","author":"Parashar A.R.","year":"2017","unstructured":"Parashar , A.R. et al . 2017 . IMAGE ENCRYPTION AND AUTHENTICATION USING REPETITIVE APPLICATION OF LINEAR TRANSFORMATIONS & MD 5. (2017), 108--118. Parashar, A.R. et al. 2017. IMAGE ENCRYPTION AND AUTHENTICATION USING REPETITIVE APPLICATION OF LINEAR TRANSFORMATIONS & MD5. (2017), 108--118."},{"key":"e_1_3_2_1_31_1","first-page":"603","article-title":"DWT Based Invisible Watermarking Technique for Digital Images","volume":"2","author":"Patil P.","year":"2013","unstructured":"Patil , P. and Bormane , D.S. 2013 . DWT Based Invisible Watermarking Technique for Digital Images . International Journal of Engineering and Advanced Technology. 2 , 4 (2013), 603 -- 605 . Patil, P. and Bormane, D.S. 2013. DWT Based Invisible Watermarking Technique for Digital Images. International Journal of Engineering and Advanced Technology. 2, 4 (2013), 603--605.","journal-title":"International Journal of Engineering and Advanced Technology."},{"key":"e_1_3_2_1_32_1","first-page":"1291","volume":"4","author":"Pratik Jain","year":"2011","unstructured":"Pratik Jain 2011 . Digital Water Marking. 4 , 13 (2011), 1291 -- 1298 . Pratik Jain 2011. Digital Water Marking. 4, 13 (2011), 1291--1298.","journal-title":"Digital Water Marking."},{"key":"e_1_3_2_1_33_1","first-page":"70","article-title":"A Survey of Digital Watermarking Techniques and its Applications","volume":"2","author":"Saini L.K.","year":"2014","unstructured":"Saini , L.K. and Shrivastava , V. 2014 . A Survey of Digital Watermarking Techniques and its Applications . International Journal of Computer Science Trends and Technology (IJCST). 2 , 3 (2014), 70 -- 73 . Saini, L.K. and Shrivastava, V. 2014. A Survey of Digital Watermarking Techniques and its Applications. International Journal of Computer Science Trends and Technology (IJCST). 2, 3 (2014), 70--73.","journal-title":"International Journal of Computer Science Trends and Technology (IJCST)."},{"key":"e_1_3_2_1_34_1","unstructured":"Saranya R.G. and Kousalya A. 2017. A Comparative Analysis of Security Algorithms Using Cryptographic Techniques in Cloud Computing. 8 2 (2017) 306--310.  Saranya R.G. and Kousalya A. 2017. A Comparative Analysis of Security Algorithms Using Cryptographic Techniques in Cloud Computing. 8 2 (2017) 306--310."},{"key":"e_1_3_2_1_35_1","unstructured":"Sathik M. and Sujatha S. 2012. A Novel DWT Based Invisible Watermarking Technique for Digital Images.pdf.  Sathik M. and Sujatha S. 2012. A Novel DWT Based Invisible Watermarking Technique for Digital Images.pdf."},{"key":"e_1_3_2_1_36_1","volume-title":"An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy. 139, 1","author":"Shrivastava A.","year":"2016","unstructured":"Shrivastava , A. 2016. An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy. 139, 1 ( 2016 ), 42--49. Shrivastava, A. 2016. An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy. 139, 1 (2016), 42--49."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2012.6449871"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-010-9295-4"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.01.008"},{"key":"e_1_3_2_1_40_1","unstructured":"Thao nvthaovn\/CompareImage (Thao). {online}.  Thao nvthaovn\/CompareImage (Thao). {online}."},{"key":"e_1_3_2_1_41_1","first-page":"184","article-title":"Digital Watermarking Applications, Parameter Measures and Techniques","volume":"17","author":"Tiwari N.","year":"2017","unstructured":"Tiwari , N. 2017 . Digital Watermarking Applications, Parameter Measures and Techniques . IJCSNS International Journal of Computer Science and Network Security. 17 , 3 (2017), 184 -- 194 . Tiwari, N. 2017. Digital Watermarking Applications, Parameter Measures and Techniques. IJCSNS International Journal of Computer Science and Network Security. 17, 3 (2017), 184--194.","journal-title":"IJCSNS International Journal of Computer Science and Network Security."},{"key":"e_1_3_2_1_42_1","first-page":"237","article-title":"Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy","volume":"5","author":"Wijayanto H.","year":"2016","unstructured":"Wijayanto , H. 2016 . Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy . International Journal of Research in Computer and Communication Technology. 5 , 5 (2016), 237 -- 242 . Wijayanto, H. et al. 2016. Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy. International Journal of Research in Computer and Communication Technology. 5, 5 (2016), 237--242.","journal-title":"International Journal of Research in Computer and Communication Technology."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.05.003"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.846774"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.03.231"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 2012 International Conference on System Engineering and Technology, ICSET 2012.","author":"Yahaya C.K.H.C.K.","year":"2012","unstructured":"Yahaya , C.K.H.C.K. et al. 2012. Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal logo authentication . Proceedings of the 2012 International Conference on System Engineering and Technology, ICSET 2012. ( 2012 ). Yahaya, C.K.H.C.K. et al. 2012. Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal logo authentication. Proceedings of the 2012 International Conference on System Engineering and Technology, ICSET 2012. (2012)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.118"}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":47,"alternative-id":["10.1145\/3301551.3301602","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301602","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}