{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:54:50Z","timestamp":1725803690889},"publisher-location":"New Delhi","reference-count":15,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132219873"},{"type":"electronic","value":"9788132219880"}],"license":[{"start":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T00:00:00Z","timestamp":1409097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T00:00:00Z","timestamp":1409097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-1988-0_2","type":"book-chapter","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T04:45:57Z","timestamp":1409028357000},"page":"17-37","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration"],"prefix":"10.1007","author":[{"given":"Sukalyan","family":"Som","sequence":"first","affiliation":[]},{"given":"Sarbani","family":"Palit","sequence":"additional","affiliation":[]},{"given":"Kashinath","family":"Dey","sequence":"additional","affiliation":[]},{"given":"Dipabali","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Jayeeta","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Kheyali","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,27]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Li, K.F., Chen, T.S., Wu, S.C.: Image tamper detection and recovery system based on discrete wavelet transformation. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 26\u201328 Aug 2001. doi:10.1109\/PACRIM.2001.953548 (2001)","DOI":"10.1109\/PACRIM.2001.953548"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Gang-chui, S., Mi-mi, Z.: Novel fragile authentication watermark based on chaotic system. In: International Symposium on Industrial Electronics, 4\u20137 May 2004. doi:10.1109\/ISIE.2004.1572034 (2004)","DOI":"10.1109\/ISIE.2004.1572034"},{"key":"2_CR3","unstructured":"Chen, T.S., Chen, J., Chen, J.G.: Tamper detection and retrieval technique based on JPEG2000 with LL subband. In Proceedings of IEEE International Conference OD Networking, Sensing & Control, Taipei, Taiwan (2004)"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Tsai, P., Hu, Y.C.: A watermarking-based authentication with malicious detection and recovery. In: 5th International Conference on Information, Communications and Signal Processing. doi:10.1109\/ICICS.2005.1689172 (2005)","DOI":"10.1109\/ICICS.2005.1689172"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Tsai, M.J., Chien, C.C.: A wavelet-based semi-fragile watermarking with recovery mechanism. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008. doi:10.1109\/ISCAS.2008.4542097 (2008)","DOI":"10.1109\/ISCAS.2008.4542097"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Qi, X., Xin, X., Chang, R.: Image authentication and tamper detection using two complementary watermarks. In: 16th IEEE International Conference on Image Processing (ICIP). doi:10.1109\/ICIP.2009.5413681 (2009)","DOI":"10.1109\/ICIP.2009.5413681"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Cruz, C., Mendoza, J.A., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Semi-fragile watermarking based image authentication with recovery capability. In: International Conference on Information Engineering and Computer Science. doi:10.1109\/ICIECS.2009.5363496 (2009)","DOI":"10.1109\/ICIECS.2009.5363496"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Wang, N., Kim, C.W.: Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD. In: 9th International Symposium on Communications and Information Technology. doi:10.1109\/ISCIT.2009.5341268 (2009)","DOI":"10.1109\/ISCIT.2009.5341268"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Yuping, H., Guangjun, G.: Watermarking-based authentication with recovery mechanism. In: 2nd International Workshop on Computer Science and Engineering. doi:10.1109\/WCSE.2009.856 (2009)","DOI":"10.1109\/WCSE.2009.856"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Hui, L., Yuping, H.: A wavelet-based watermarking scheme with authentication and recovery mechanism. In: International Conference on Electrical and Control Engineering (ICECE). doi:10.1109\/iCECE.2010.86 (2010)","DOI":"10.1109\/iCECE.2010.86"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Wang, L.J., Syue, M.Y.: Image authentication and recovery using wavelet-based multipurpose watermarking. In: 10th International Joint Conference on Computer Science and Software Engineering (JCSSE). doi:10.1109\/JCSSE.2013.6567315 (2013)","DOI":"10.1109\/JCSSE.2013.6567315"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"T Lee","year":"2008","unstructured":"Lee, T., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41, 3497\u20133506 (2008)","journal-title":"Pattern Recogn."},{"key":"2_CR13","unstructured":"USC-SIPI image database: Available at http:\/\/sipi.usc.edu\/database. Accessed on 1 Jan 2012"},{"key":"2_CR14","unstructured":"Computational Perception and Image Quality Lab, Oklahoma State University, www.vision.okstate.edu. Accessed on 1 Jan 2012"},{"issue":"4","key":"2_CR15","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Advances in Intelligent Systems and Computing","Applied Computation and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1988-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T15:21:44Z","timestamp":1674487304000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1988-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,27]]},"ISBN":["9788132219873","9788132219880"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1988-0_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,8,27]]},"assertion":[{"value":"27 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}