{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:05:18Z","timestamp":1730343918241,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356354","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T23:01:01Z","timestamp":1525993261000},"page":"92-97","source":"Crossref","is-referenced-by-count":4,"title":["A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection"],"prefix":"10.23919","author":[{"given":"Ferda","family":"Ernawan","sequence":"first","affiliation":[{"name":"Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Lebuhraya Tun Razak 26300 Gambang, Kuantan Pahang, Darul Makmur, Malaysia"}]},{"given":"Muhammad Nomani","family":"Kabir","sequence":"additional","affiliation":[{"name":"Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Lebuhraya Tun Razak 26300 Gambang, Kuantan Pahang, Darul Makmur, Malaysia"}]},{"given":"Zuriani","family":"Mustaffa","sequence":"additional","affiliation":[{"name":"Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Lebuhraya Tun Razak 26300 Gambang, Kuantan Pahang, Darul Makmur, Malaysia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.08.007"},{"key":"ref11","first-page":"4177","article-title":"An Efficient Image Compression Using Bit Allocation based on psychovisual Threshold","volume":"9","author":"ernawan","year":"2016","journal-title":"Journal of Information (Japan)"},{"key":"ref12","first-page":"566","article-title":"The optimal quantization matrices for jpeg image compression from psychovisual threshold","volume":"70","author":"ernawan","year":"2014","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2014.5255"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/821497"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA.2013.6530010"},{"key":"ref16","first-page":"566","article-title":"The optimal quantization matrices for JPEG image compression from psychovisual threshold","volume":"70","author":"ernawan","year":"2014","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2014.5316"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2013.716.725"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.12988\/ams.2014.48616"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.09.028"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.10.047"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5614\/itbj.ict.res.appl.2016.10.3.3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36818-9_60"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2013.08.018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2016.12.003"},{"key":"ref2","first-page":"111","article-title":"An improved imperceptibility and robustness of 4&#x00D7;4 DCT-SVD image watermarking using modified entropy","volume":"9","author":"ernawan","year":"2017","journal-title":"Journal of Telecommunication Electronic and Computer Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTC.2016.7877339"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4999-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2013.6574574"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge, UK","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356354.pdf?arnumber=8356354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:16:10Z","timestamp":1618445770000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356354\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356354","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}