{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T04:49:57Z","timestamp":1773809397633,"version":"3.50.1"},"reference-count":81,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"\u201cRobust and Secure Copyright Protection Techniques for E-Government Document,\u201d","award":["NITP\/1457\/19"],"award-info":[{"award-number":["NITP\/1457\/19"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,2,28]]},"abstract":"<jats:p>Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. To achieve this, in this article, we propose a joint encryption then-compression based watermarking technique for digital document security. This technique offers a tool for confidentiality, copyright protection, and strong compression performance of the system. The proposed method involves three major steps as follows: (1) embedding of multiple watermarks through non-sub-sampled contourlet transform, redundant discrete wavelet transform, and singular value decomposition; (2) encryption and compression via SHA-256 and Lempel Ziv Welch (LZW), respectively; and (3) extraction\/recovery of multiple watermarks from the possibly distorted cover image. The performance estimations are carried out on various images at different attacks, and the efficiency of the system is determined in terms of peak signal-to-noise ratio (PSNR) and normalized correlation (NC), structural similarity index measure (SSIM), number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and compression ratio (CR). Furthermore, the comparative analysis of the proposed system with similar schemes indicates its superiority to them.<\/jats:p>","DOI":"10.1145\/3414474","type":"journal-article","created":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T11:17:41Z","timestamp":1610536661000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents"],"prefix":"10.1145","volume":"21","author":[{"given":"A. K.","family":"Singh","sequence":"first","affiliation":[{"name":"Dept. of CSE, NIT Patna, Bihar, India"}]},{"given":"S.","family":"Thakur","sequence":"additional","affiliation":[{"name":"Dept. of CSE, JUIT, Waknaghat, Solan, HP, India"}]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[{"name":"Dept. of Computing, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Dept. of Mathematics and Computer Science, Brandon University, Canada, Research Centre for Interneural Computing, China Medical University, Taiwan"}]},{"given":"MD.","family":"Elhoseny","sequence":"additional","affiliation":[{"name":"Faculty of Computers and Information, Mansoura University, Egypt"}]},{"given":"A.","family":"Mohan","sequence":"additional","affiliation":[{"name":"Dept. of ECE, IIT (BHU), Varanasi, UP, India"}]}],"member":"320","published-online":{"date-parts":[[2021,1,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4886-4"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.06.034"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2020.2985973"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2684980"},{"key":"#cr-split#-e_1_2_1_5_1.1","doi-asserted-by":"crossref","unstructured":"A. Anand and A. K. Singh. 2020. Watermarking techniques for medical data authentication: A survey. Multimedia Tools and Applications DOI:10.1007\/s11042-020-08801-0 10.1007\/s11042-020-08801-0","DOI":"10.1007\/s11042-020-08801-0"},{"key":"#cr-split#-e_1_2_1_5_1.2","doi-asserted-by":"crossref","unstructured":"A. Anand and A. K. Singh. 2020. Watermarking techniques for medical data authentication: A survey. Multimedia Tools and Applications DOI:10.1007\/s11042-020-08801-0","DOI":"10.1007\/s11042-020-08801-0"},{"key":"e_1_2_1_6_1","volume-title":"ial: Robust and secure data hiding techniques for telemedicine applications. Multimedia Tools and Applications 76, 5","author":"Singh A. K.","year":"2017","unstructured":"A. K. Singh , B. Kumar , S. K. Singh , M. Dave , V. K Singh , P. Kumar , S. P. Ghrera , P. K Gupta , and A. Mohan . Guest editor ial: Robust and secure data hiding techniques for telemedicine applications. Multimedia Tools and Applications 76, 5 ( 2017 ), 7563--7573. A. K. Singh, B. Kumar, S. K. Singh, M. Dave, V. K Singh, P. Kumar, S. P. Ghrera, P. K Gupta, and A. Mohan. Guest editorial: Robust and secure data hiding techniques for telemedicine applications. Multimedia Tools and Applications 76, 5 (2017), 7563--7573."},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"S. Thakur A. K. Singh S. P. GhreraM Dave. 2018. Watermarking techniques and its applications in tele-health: A technical survey. In Cryptographic and Information Security Approaches for Images and Videos S. Ramakrishnan (ed.) CRC Press 467--508.  S. Thakur A. K. Singh S. P. GhreraM Dave. 2018. Watermarking techniques and its applications in tele-health: A technical survey. In Cryptographic and Information Security Approaches for Images and Videos S. Ramakrishnan (ed.) CRC Press 467--508.","DOI":"10.1201\/9780429435461-17"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3267983.3268062"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Priya R. Varatharajan G. Manogaran R. Sundarasekar and P. M. Kumar. 2018. Paillierhomomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal and Ubiquitous Computing 1--11 2018. DOI:https:\/\/doi.org\/10.1007\/s00779-018-1131-8  S. Priya R. Varatharajan G. Manogaran R. Sundarasekar and P. M. Kumar. 2018. Paillierhomomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal and Ubiquitous Computing 1--11 2018. DOI:https:\/\/doi.org\/10.1007\/s00779-018-1131-8","DOI":"10.1007\/s00779-018-1131-8"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2018.02.021"},{"key":"e_1_2_1_11_1","volume-title":"Advances in Graphic Communication, Printing and Packaging 187--196.","author":"Yijing Xun","year":"2019","unstructured":"Xun Yijing , Zhijiang Li , XiaoluZhong, Sheng Li , Jiawang Su , and Ke Zhang . 2019. Dual anti-counterfeiting of QR code based on information encryption and digital watermarking . In Advances in Graphic Communication, Printing and Packaging 187--196. Singapore , 2019 . Xun Yijing, Zhijiang Li, XiaoluZhong, Sheng Li, Jiawang Su, and Ke Zhang. 2019. Dual anti-counterfeiting of QR code based on information encryption and digital watermarking. In Advances in Graphic Communication, Printing and Packaging 187--196. Singapore, 2019."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-019-1961-2"},{"key":"e_1_2_1_13_1","volume-title":"2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 1--6. IEEE","author":"Hanen Rhayma","year":"2018","unstructured":"Rhayma Hanen , Achraf Makhloufi , and Ahmed ben Hmida . 2018 . Robust watermarking scheme integrated into JPWL based on turbo-trellis-coded quantization . In 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 1--6. IEEE , 2018. Rhayma Hanen, Achraf Makhloufi, and Ahmed ben Hmida. 2018. Robust watermarking scheme integrated into JPWL based on turbo-trellis-coded quantization. In 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 1--6. IEEE, 2018."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4487-2"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2788-4"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4048-0"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1049\/iet-ipr.2018.5288","article-title":"Biometric-based efficient medical image watermarking in E-healthcare application","volume":"13","author":"Puvvadi Aparna","year":"2018","unstructured":"Aparna Puvvadi , and PolurieVenkata Vijay Kishore . 2018 . Biometric-based efficient medical image watermarking in E-healthcare application . IET Image Processing 13 , 3 (2018), 421 -- 428 . Aparna Puvvadi, and PolurieVenkata Vijay Kishore. 2018. Biometric-based efficient medical image watermarking in E-healthcare application. IET Image Processing 13, 3 (2018), 421--428.","journal-title":"IET Image Processing"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4570-8"},{"key":"e_1_2_1_19_1","volume-title":"Future of Information and Communication Conference 988--1003","author":"Sonali Chandel","year":"2019","unstructured":"Chandel Sonali , Wenxuan Cao , Zijing Sun , Jiayi Yang , Bailu Zhang , and Tian-Yi Ni . 2019 . A multi-dimensional adversary analysis of RSA and ECC in blockchain encryption . In Future of Information and Communication Conference 988--1003 . Springer, Cham , 2019. Chandel Sonali, Wenxuan Cao, Zijing Sun, Jiayi Yang, Bailu Zhang, and Tian-Yi Ni. 2019. A multi-dimensional adversary analysis of RSA and ECC in blockchain encryption. In Future of Information and Communication Conference 988--1003. Springer, Cham, 2019."},{"key":"e_1_2_1_20_1","volume-title":"Application of image compression to multiple-shot pictures using similarity norms with three level blurring. CMC-Computers Materials 8 Continua 59, 3","author":"Mohammed Omari","year":"2019","unstructured":"Omari Mohammed and SouleymaneOuledJaafri. 2019. Application of image compression to multiple-shot pictures using similarity norms with three level blurring. CMC-Computers Materials 8 Continua 59, 3 ( 2019 ), 753--775. Omari Mohammed and SouleymaneOuledJaafri. 2019. Application of image compression to multiple-shot pictures using similarity norms with three level blurring. CMC-Computers Materials 8 Continua 59, 3 (2019), 753--775."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2020.2993269"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2016.08.011"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3885-1"},{"key":"e_1_2_1_24_1","volume-title":"2018 25th IEEE International Conference on Image Processing (ICIP), 1688--1692","author":"Sahar Haddad","year":"2018","unstructured":"Haddad Sahar , Gouenou Coatrieux , and Michel Cozic . 2018 . A new joint watermarking-encryption-JPEG-LS compression method for a priori 8 a posteriori image protection . In 2018 25th IEEE International Conference on Image Processing (ICIP), 1688--1692 . IEEE, 2018. Haddad Sahar, Gouenou Coatrieux, and Michel Cozic. 2018. A new joint watermarking-encryption-JPEG-LS compression method for a priori 8 a posteriori image protection. In 2018 25th IEEE International Conference on Image Processing (ICIP), 1688--1692. IEEE, 2018."},{"key":"e_1_2_1_25_1","volume-title":"Signal Processing: Image Communication 45","author":"Hong Liu","year":"2016","unstructured":"Liu Hong , Di Xiao , Rui Zhang , Yushu Zhang , and SenBai. 2016 . Robust and hierarchical watermarking of encrypted images based on compressive sensing . Signal Processing: Image Communication 45 , (2016), 41--51. Liu Hong, Di Xiao, Rui Zhang, Yushu Zhang, and SenBai. 2016. Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Processing: Image Communication 45, (2016), 41--51."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.4236\/cs.2016.78149"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3532-x"},{"key":"e_1_2_1_28_1","first-page":"1","article-title":"Chaotic based secure watermarking approach for medical images","volume":"79","author":"Thakur S.","year":"2018","unstructured":"S. Thakur , A. K. Singh , S. P. Ghrera , and A. Mohan . 2018 . Chaotic based secure watermarking approach for medical images . Multimedia Tools and Applications 79 (2018), 1 -- 14 . S. Thakur, A. K. Singh, S. P. Ghrera, and A. Mohan. 2018. Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications 79 (2018), 1--14.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3514-z"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3862-8"},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"S. Thakur A. K. Singh and S. P. Ghrera. 2018. NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images. Concurrency and Computation: Practice and Experience (2018): e5108.  S. Thakur A. K. Singh and S. P. Ghrera. 2018. NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images. Concurrency and Computation: Practice and Experience (2018): e5108.","DOI":"10.1002\/cpe.5108"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4570-8"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2018.06.003"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MEC.2013.6885244"},{"key":"e_1_2_1_35_1","volume-title":"2015 International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC-15)","author":"Fan Wu","year":"2015","unstructured":"Wu Fan and Jingbing Li . 2015 . Robust watermarking for text images based on Arnold scrambling and DWT-DCT . In 2015 International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC-15) . Atlantis Press , 2015. Wu Fan and Jingbing Li. 2015. Robust watermarking for text images based on Arnold scrambling and DWT-DCT. In 2015 International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC-15). Atlantis Press, 2015."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1596-y"},{"key":"e_1_2_1_37_1","first-page":"2591","article-title":"An enhanced SVD technique for authentication and protection of text-images using a case study on digital quran content with sensitivity constraints","volume":"10","author":"Lamri Laouamer","year":"2013","unstructured":"Laouamer Lamri and Omar Tayan . 2013 . An enhanced SVD technique for authentication and protection of text-images using a case study on digital quran content with sensitivity constraints . Life Science Journal 10 , 2 (2013), 2591 -- 2597 . Laouamer Lamri and Omar Tayan. 2013. An enhanced SVD technique for authentication and protection of text-images using a case study on digital quran content with sensitivity constraints. Life Science Journal 10, 2 (2013), 2591--2597.","journal-title":"Life Science Journal"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6461-z"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2057-6"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.07.040"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.12.008"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.06.005"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2014.12.043"},{"key":"e_1_2_1_45_1","first-page":"1","article-title":"A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems","volume":"83","author":"Xingyuan Wang","year":"2016","unstructured":"Wang Xingyuan and Hui-li Zhang. 2016 . A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems . Nonlinear Dynamics 83 , 1 \u2013 2 (2016), 333--346. Wang Xingyuan and Hui-li Zhang. 2016. A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics 83, 1\u20132 (2016), 333--346.","journal-title":"Nonlinear Dynamics"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.09.007"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.02.069"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.04.006"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.021"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.04.022"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6820-9"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.07.015"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2005.01.013"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.891046"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2003.815962"},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE","author":"Akiyoshi Wakatani","year":"2002","unstructured":"Wakatani Akiyoshi . 2002 . Digital watermarking for ROI medical images by using compressed signature image . In Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE , 2043--2048. Wakatani Akiyoshi. 2002. Digital watermarking for ROI medical images by using compressed signature image. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, 2043--2048."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.08.029"},{"key":"e_1_2_1_59_1","volume-title":"Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Arxiv Preprint Arxiv:1101.1603","author":"Mohamad Zain Jasni","year":"2011","unstructured":"Zain Jasni Mohamad , and Malcolm Clarke . 2011. Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Arxiv Preprint Arxiv:1101.1603 ( 2011 ). Zain Jasni Mohamad, and Malcolm Clarke. 2011. Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Arxiv Preprint Arxiv:1101.1603 (2011)."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2011.01.014"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4898-0"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6419-1"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0806-3"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.01.014"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.11.018"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.2478\/s11772-013-0088-4"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3010-x"},{"key":"e_1_2_1_68_1","volume-title":"Information authentication for a slippery new age. Dr. Dobbs Journal","author":"Walton Steve","year":"1995","unstructured":"Steve Walton . 1995. Information authentication for a slippery new age. Dr. Dobbs Journal ( 1995 ), 18--26. Steve Walton. 1995. Information authentication for a slippery new age. Dr. Dobbs Journal (1995), 18--26."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0455-1"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7084-0"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2019.101665"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3127-y"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.059"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2013.10.124"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.03.017"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-019-01112-2"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.038"},{"key":"e_1_2_1_78_1","unstructured":"Public domain test images. Retrieved from https:\/\/homepages.cae.wisc.edu\/\u223cece533\/images\/.  Public domain test images. Retrieved from https:\/\/homepages.cae.wisc.edu\/\u223cece533\/images\/."},{"key":"e_1_2_1_79_1","unstructured":"MedPix searchable online database. Retrieved from https:\/\/medpix.nlm.nih.gov\/.  MedPix searchable online database. Retrieved from https:\/\/medpix.nlm.nih.gov\/."},{"key":"e_1_2_1_80_1","volume-title":"Cyber Journals: Multidisciplinary Journals in Science and Technology. Journal of Selected Areas in Telecommunications","author":"Wu Y.","year":"2011","unstructured":"Y. Wu , J. P. Noonan , S. Agaian . 2011. NPCR and UACI Randomness Tests for Image Encryption \u201d, Cyber Journals: Multidisciplinary Journals in Science and Technology. Journal of Selected Areas in Telecommunications ( 2011 ), 31--38. Y. Wu, J. P. Noonan, S. Agaian. 2011. NPCR and UACI Randomness Tests for Image Encryption\u201d, Cyber Journals: Multidisciplinary Journals in Science and Technology. Journal of Selected Areas in Telecommunications (2011), 31--38."}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3414474","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3414474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:38Z","timestamp":1750199918000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3414474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,13]]},"references-count":81,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2,28]]}},"alternative-id":["10.1145\/3414474"],"URL":"https:\/\/doi.org\/10.1145\/3414474","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,13]]},"assertion":[{"value":"2020-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}