{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:08:38Z","timestamp":1730344118009,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/iconac.2018.8748967","type":"proceedings-article","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T22:15:49Z","timestamp":1562278549000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Column Level Image Authentication Technique using Hidden Digital Signatures"],"prefix":"10.23919","author":[{"given":"Sahib","family":"Khan","sequence":"first","affiliation":[]},{"given":"Muneeza","family":"Wahid","sequence":"additional","affiliation":[]},{"given":"Tawab","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Nasir","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Muhammad Haseeb","family":"Zafar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4236\/jsip.2013.44043"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/el:20030041"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5473-4"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.procs.2017.10.072","article-title":"A review of collisions in cryptographic hash function used in digital forensic tools","volume":"116","author":"rasjid","year":"2017","journal-title":"Procedia Computer Science"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.46586\/tosc.v2017.i3.1-23","article-title":"Groestl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation","volume":"2017","author":"cauchois","year":"2017","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1769"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICEET1.2018.8338621"},{"key":"ref4","article-title":"4LSB based Data Hiding in Complex Region of Digital Images and its effects on Edges and Histogram","volume":"36","author":"khan","year":"2017","journal-title":"Journal of Engineering and Applied Sciences (JEAS) Peshawar"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935081"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.12.017"},{"key":"ref5","first-page":"569","article-title":"PRNU-Based Forgery Localization in a Blind Scenario","author":"cozzolino","year":"2017","journal-title":"International Conference on Image Analysis and Processing"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"379","DOI":"10.11591\/ijece.v8i1.pp379-389","article-title":"Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region","volume":"8","author":"khan","year":"2018","journal-title":"International Journal of Electricaland Computer Engineering (IJECE)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2263533"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2146250"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2011.0574"}],"event":{"name":"2018 24th International Conference on Automation and Computing (ICAC)","start":{"date-parts":[[2018,9,6]]},"location":"Newcastle upon Tyne, United Kingdom","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 24th International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8742895\/8748945\/08748967.pdf?arnumber=8748967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T10:13:54Z","timestamp":1643278434000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8748967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/iconac.2018.8748967","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}