{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:41:55Z","timestamp":1720114915916},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1016\/j.ins.2012.06.014","type":"journal-article","created":{"date-parts":[[2012,6,30]],"date-time":"2012-06-30T01:02:56Z","timestamp":1341018176000},"page":"155-175","source":"Crossref","is-referenced-by-count":30,"special_numbering":"C","title":["Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras"],"prefix":"10.1016","volume":"216","author":[{"given":"Asifullah","family":"Khan","sequence":"first","affiliation":[]},{"given":"Sana Ambreen","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Asad","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Rafiullah","family":"Chamlawi","sequence":"additional","affiliation":[]},{"given":"Mutawarra","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Muhammad Tariq","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Usman","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2012.06.014_b0005","doi-asserted-by":"crossref","unstructured":"T.H. Afridi, A. Khan, Y.S. Lee, Mito-GSAAC: mitochondria prediction using genetic ensemble classifier and split amino acid composition, Amino Acids (2011), doi:http:\/\/dx.doi.org\/10.1007\/s00726-011-0888-0.","DOI":"10.1007\/s00726-011-0888-0"},{"key":"10.1016\/j.ins.2012.06.014_b0010","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/978-3-642-02900-4_19","article-title":"Reversible watermarking for 3D cameras: hiding depth maps","volume":"231","author":"Ali","year":"2009","journal-title":"Multimedia Signal Processing and Communications"},{"issue":"4","key":"10.1016\/j.ins.2012.06.014_b0015","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1016\/j.jss.2011.11.005","article-title":"Intelligent reversible watermarking in integer wavelet domain for medical images","volume":"85","author":"Arsalan","year":"2012","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.ins.2012.06.014_b0020","doi-asserted-by":"crossref","unstructured":"M.U. Celik, G. Sharma, A.M. Tekalp, E. Saber, Reversible data hiding, In: Proceedings of IEEE International Conference on Image Processing, vol. II, Rochester, USA, 2002, pp. 157\u2013160.","DOI":"10.1109\/ICIP.2002.1039911"},{"issue":"2","key":"10.1016\/j.ins.2012.06.014_b0025","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.patcog.2007.06.003","article-title":"Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery","volume":"41","author":"Chang","year":"2008","journal-title":"Pattern Recognition"},{"issue":"24","key":"10.1016\/j.ins.2012.06.014_b0030","doi-asserted-by":"crossref","first-page":"4909","DOI":"10.1016\/j.ins.2010.08.039","article-title":"Digital image authentication and recovery: employing integer transform based information embedding and extraction","volume":"180","author":"Chamlawi","year":"2010","journal-title":"Information Sciences"},{"issue":"3","key":"10.1016\/j.ins.2012.06.014_b0035","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.compeleceng.2009.12.003","article-title":"Authentication and recovery of images using multiple watermarks","volume":"36","author":"Chamlawi","year":"2010","journal-title":"Computers and Electrical Engineering"},{"issue":"16","key":"10.1016\/j.ins.2012.06.014_b0040","doi-asserted-by":"crossref","first-page":"3045","DOI":"10.1016\/j.ins.2010.03.027","article-title":"reversible data hiding scheme using complementary embedding strategy","volume":"180","author":"Chang","year":"2010","journal-title":"Information Sciences"},{"issue":"11","key":"10.1016\/j.ins.2012.06.014_b0045","doi-asserted-by":"crossref","first-page":"2433","DOI":"10.1016\/j.ins.2007.12.016","article-title":"A novel secret image sharing scheme in color images using small shadow images","volume":"178","author":"Chang","year":"2008","journal-title":"Information Sciences"},{"issue":"13","key":"10.1016\/j.ins.2012.06.014_b0050","doi-asserted-by":"crossref","first-page":"2283","DOI":"10.1016\/j.ins.2009.03.003","article-title":"Preserving robustness and removability for digital watermarks using subsampling and difference correlation","volume":"179","author":"Chang","year":"2009","journal-title":"Information Sciences"},{"issue":"7","key":"10.1016\/j.ins.2012.06.014_b0055","first-page":"587","article-title":"Fragile watermarking using finite field trigonometrical transforms","volume":"24","author":"Cintra","year":"2009","journal-title":"Image Communication"},{"issue":"3","key":"10.1016\/j.ins.2012.06.014_b0060","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","article-title":"Improved embedding for prediction based reversible watermarking","volume":"6","author":"Coltuc","year":"2011","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.ins.2012.06.014_b0065","doi-asserted-by":"crossref","unstructured":"I. Fridrich, M. Goljan, R. Du, Invertible authentication, In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, vol. 3971, San Jose, CA, USA, 2001, pp. 197\u2013208.","DOI":"10.1117\/12.435400"},{"issue":"8","key":"10.1016\/j.ins.2012.06.014_b0070","doi-asserted-by":"crossref","first-page":"1061","DOI":"10.1109\/TCSVT.2011.2130410","article-title":"Lossless data embedding using generalized statistical quantity histogram","volume":"21","author":"Gao","year":"2011","journal-title":"IEEE Transactions on Circuits System Video Technology"},{"key":"10.1016\/j.ins.2012.06.014_b0075","doi-asserted-by":"crossref","unstructured":"G. Gupta, J. Pieprzyk, Database Relation Watermarking Resilient against Secondary Watermarking Attacks, In: Proceedings of International Conference on Information Systems Security, vol. 5905, Kolkata, India, 2009, pp. 222\u2013236.","DOI":"10.1007\/978-3-642-10772-6_17"},{"issue":"1","key":"10.1016\/j.ins.2012.06.014_b0080","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jtbi.2010.11.017","article-title":"Predicting membrane protein types by fusing composite protein sequence features into pseudo amino acid composition","volume":"271","author":"Hayat","year":"2011","journal-title":"Journal of Theoretical Biology"},{"key":"10.1016\/j.ins.2012.06.014_b0085","unstructured":"A. Khan, Intelligent Perceptual shaping of a digital watermark, PhD Dissertation, Faculty of Computer Science and Engineering, GIK Institute, Pakistan, 2006."},{"issue":"4","key":"10.1016\/j.ins.2012.06.014_b0090","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.inffus.2005.09.007","article-title":"Genetic perceptual shaping: utilizing cover image and conceivable attack information during watermark embedding","volume":"8","author":"Khan","year":"2007","journal-title":"Information Fusion"},{"issue":"2","key":"10.1016\/j.ins.2012.06.014_b0095","first-page":"144","article-title":"Optimizing perceptual shaping of a digital watermark using genetic programming","volume":"3","author":"Khan","year":"2004","journal-title":"Iranian Journal of Electrical and Computer Engineering"},{"issue":"8","key":"10.1016\/j.ins.2012.06.014_b0100","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1016\/j.patcog.2008.01.007","article-title":"Machine learning based adaptive watermark decoding in view of an anticipated attack","volume":"41","author":"Khan","year":"2008","journal-title":"Pattern Recognition"},{"issue":"3","key":"10.1016\/j.ins.2012.06.014_b0105","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","article-title":"Reversible image watermarking based on integer-to-integer wavelet transform","volume":"2","author":"Lee","year":"2007","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"10.1016\/j.ins.2012.06.014_b0110","doi-asserted-by":"crossref","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","article-title":"Dual watermark for image tamper detection and recovery","volume":"41","author":"Lee","year":"2008","journal-title":"Pattern Recognition"},{"issue":"1","key":"10.1016\/j.ins.2012.06.014_b0115","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1117\/1.2712445","article-title":"Wavelet-based fragile watermarking scheme for image authentication","volume":"16","author":"Li","year":"2007","journal-title":"Journal of Electronic Imaging"},{"issue":"19","key":"10.1016\/j.ins.2012.06.014_b0120","doi-asserted-by":"crossref","first-page":"3349","DOI":"10.1016\/j.ins.2009.05.022","article-title":"Wavelet-based copyright-protection scheme for digital images based on local features","volume":"179","author":"Lin","year":"2009","journal-title":"Information Sciences"},{"issue":"5","key":"10.1016\/j.ins.2012.06.014_b0125","doi-asserted-by":"crossref","first-page":"1224","DOI":"10.1109\/TIP.2010.2040757","article-title":"Generic lossless visible watermarking \u2013 a new approach","volume":"19","author":"Liu","year":"2010","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.ins.2012.06.014_b0130","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1007\/978-3-540-69848-7_81","article-title":"DCT and PCA based method for shape from focus","volume":"5073","author":"Mahmood","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"10.1016\/j.ins.2012.06.014_b0135","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1016\/j.ins.2010.11.039","article-title":"Combining focus measures for three dimensional shape recovery using genetic programming","volume":"181","author":"Mahmood","year":"2011","journal-title":"Information Sciences"},{"issue":"3","key":"10.1016\/j.ins.2012.06.014_b0140","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.ins.2010.09.029","article-title":"Perceptually adaptive spread transform image watermarking scheme using Hadamard transform","volume":"181","author":"Maity","year":"2011","journal-title":"Information Sciences"},{"issue":"1","key":"10.1016\/j.ins.2012.06.014_b0145","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.patcog.2006.05.032","article-title":"Consideration of illumination effects and optimization of window size for accurate calculation of depth map for 3D shape recovery","volume":"40","author":"Malik","year":"2007","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.ins.2012.06.014_b0150","unstructured":"G. Morikowa, G. Tokura, Picture taking apparatus and method of controlling same, US Patent and Trademark Office 0025574 A1, 2008."},{"key":"10.1016\/j.ins.2012.06.014_b0155","unstructured":"M. Naveed, A. Khan, GPCR-MPredictor: multi-level prediction of G protein-coupled receptors using genetic ensemble, Amino Acids (2011), doi:101007\/s00726-011-09026."},{"issue":"2","key":"10.1016\/j.ins.2012.06.014_b0160","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"issue":"7","key":"10.1016\/j.ins.2012.06.014_b0165","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"10.1016\/j.ins.2012.06.014_b0170","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","article-title":"Genetic watermarking based on transform domain techniques","volume":"37","author":"Shieh","year":"2004","journal-title":"Pattern Recognition"},{"issue":"4","key":"10.1016\/j.ins.2012.06.014_b0175","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/78.492555","article-title":"Localization of the complex spectrum: the S transform","volume":"44","author":"Stockwell","year":"1996","journal-title":"IEEE Transactions of Signal Processing"},{"issue":"2","key":"10.1016\/j.ins.2012.06.014_b0180","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/S1386-5056(01)00135-6","article-title":"The present and future of telemedicine in Japan","volume":"61","author":"Takahashi","year":"2001","journal-title":"International Journal of Medical Informatics"},{"issue":"8","key":"10.1016\/j.ins.2012.06.014_b0185","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"6","key":"10.1016\/j.ins.2012.06.014_b0190","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1016\/j.jss.2009.12.026","article-title":"Robust lossless image watermarking based on a-trimmed mean algorithm and support vector machine","volume":"83","author":"Tsai","year":"2010","journal-title":"Journal of Systems and Software"},{"issue":"1","key":"10.1016\/j.ins.2012.06.014_b0195","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.asoc.2009.08.004","article-title":"BCH coding and intelligent watermark embedding: employing both frequency and strength selection","volume":"10","author":"Usman","year":"2010","journal-title":"Applied Soft computing"},{"issue":"1","key":"10.1016\/j.ins.2012.06.014_b0200","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TMM.2003.809729","article-title":"Circular interpretation of bijective transformations in lossless watermarking for media asset management","volume":"5","author":"Vleeschouwer","year":"2003","journal-title":"IEEE Transactions on Multimedia"},{"issue":"6","key":"10.1016\/j.ins.2012.06.014_b0205","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/LSP.2010.2046930","article-title":"Efficient generalized integer transform for reversible watermarking","volume":"17","author":"Wang","year":"2010","journal-title":"IEEE Signal Processing Letters"},{"key":"10.1016\/j.ins.2012.06.014_b0210","doi-asserted-by":"crossref","first-page":"5501","DOI":"10.1016\/j.ins.2011.07.040","article-title":"An optimal image watermarking approach based on a multi-objective genetic algorithm","volume":"181","author":"Wang","year":"2011","journal-title":"Information Sciences"},{"issue":"9","key":"10.1016\/j.ins.2012.06.014_b0215","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1016\/j.jss.2007.09.017","article-title":"An embedding technique based upon block prediction","volume":"8","author":"Wu","year":"2008","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.ins.2012.06.014_b0220","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.1109\/ICME.2005.1521722","article-title":"Lossless data hiding using integer wavelet transform and threshold embedding technique","volume":"38","author":"Xuan","year":"2005","journal-title":"IEEE International Conference on Multimedia and Expo"},{"issue":"25","key":"10.1016\/j.ins.2012.06.014_b0225","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1049\/el:20021131","article-title":"Distortionless data hiding based on integer wavelet transform","volume":"38","author":"Xuan","year":"2002","journal-title":"IEEE Electronics Letters"},{"key":"10.1016\/j.ins.2012.06.014_b0230","doi-asserted-by":"crossref","unstructured":"G. Yahav, G.J. Iddan, D. Mandelboum, 3D imaging camera for gaming application, In: Proceedings of International Conference on Consumer Electronics, 2007, pp. 1\u20132.","DOI":"10.1109\/ICCE.2007.341537"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025512004094?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025512004094?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T12:11:04Z","timestamp":1561896664000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025512004094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":46,"alternative-id":["S0020025512004094"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2012.06.014","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2012,12]]}}}