{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T08:45:24Z","timestamp":1673599524726},"reference-count":26,"publisher":"Elsevier BV","issue":"11","license":[{"start":{"date-parts":[[2012,11,1]],"date-time":"2012-11-01T00:00:00Z","timestamp":1351728000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1016\/j.jss.2012.06.015","type":"journal-article","created":{"date-parts":[[2012,6,15]],"date-time":"2012-06-15T17:13:19Z","timestamp":1339780399000},"page":"2665-2673","source":"Crossref","is-referenced-by-count":6,"title":["Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches"],"prefix":"10.1016","volume":"85","author":[{"given":"Sana Ambreen","family":"Malik","sequence":"first","affiliation":[]},{"given":"Asifullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mutawarra","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Khurram","family":"Jawad","sequence":"additional","affiliation":[]},{"given":"Rafiullah","family":"Chamlawi","sequence":"additional","affiliation":[]},{"given":"Abdul","family":"Jalil","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.jss.2012.06.015_bib0005","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1007\/s00726-011-0888-0","article-title":"Mito-GSAAC: mitochondria prediction using genetic ensemble classifier and split amino acid composition","volume":"42","author":"Afridi","year":"2012","journal-title":"Amino Acids"},{"key":"10.1016\/j.jss.2012.06.015_bib0010","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/978-3-642-02900-4_19","article-title":"Reversible watermarking for 3D cameras: hiding depth maps","volume":"231","author":"Ali","year":"2009","journal-title":"Multimedia Signal Processing and Communication"},{"issue":"4","key":"10.1016\/j.jss.2012.06.015_bib0015","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1016\/j.jss.2011.11.005","article-title":"Intelligent reversible watermarking in integer wavelet domain for medical images","volume":"85","author":"Arsalan","year":"2011","journal-title":"Journal of Systems and Software"},{"issue":"14","key":"10.1016\/j.jss.2012.06.015_bib0020","doi-asserted-by":"crossref","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","article-title":"Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms","volume":"282","author":"Aslantas","year":"2009","journal-title":"Optics Communications"},{"key":"10.1016\/j.jss.2012.06.015_bib0025","doi-asserted-by":"crossref","unstructured":"Buehren, M., 2011. Differential Evolution, Matlab Central, March, http:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/18593-differential-evolution.","DOI":"10.1016\/j.ins.2010.08.039"},{"key":"10.1016\/j.jss.2012.06.015_bib0030","doi-asserted-by":"crossref","first-page":"4909","DOI":"10.1016\/j.jss.2011.02.029","article-title":"Digital image authentication and recovery: employing integer transform based information embedding and extraction","volume":"180","author":"Chamlawi","year":"2010","journal-title":"Information Sciences"},{"key":"10.1016\/j.jss.2012.06.015_bib0035","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1016\/j.jss.2010.11.891","article-title":"A secure fragile watermarking scheme based on chaos-and-hamming code","volume":"84","author":"Chang","year":"2011","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.jss.2012.06.015_bib0040","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/S0045-7825(99)00389-8","article-title":"Adaptive reversible image watermarking scheme","volume":"84","author":"Chen","year":"2011","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.jss.2012.06.015_bib0045","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.optcom.2010.07.020","article-title":"An efficient constraint handling method for genetic algorithms","volume":"186","author":"Deb","year":"2000","journal-title":"Computer Methods in Applied Mechanics and Engineering"},{"issue":"24","key":"10.1016\/j.jss.2012.06.015_bib0050","doi-asserted-by":"crossref","first-page":"4916","DOI":"10.1016\/j.optcom.2011.04.006","article-title":"A color image watermarking scheme based on hybrid classification method: particle swarm optimization and k-nearest neighbor algorithm","volume":"283","author":"Findik","year":"2010","journal-title":"Optics Communications"},{"issue":"16\u201317","key":"10.1016\/j.jss.2012.06.015_bib0055","doi-asserted-by":"crossref","first-page":"3918","DOI":"10.1364\/OL.26.000402","article-title":"Image watermarking algorithm based on fractional Fourier transform and random phase encoding","volume":"284","author":"Guo","year":"2011","journal-title":"Optics Communications"},{"key":"10.1016\/j.jss.2012.06.015_bib0060","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1364\/OL.26.000402","article-title":"Wave-front sensing with time-of-flight phase diversity","volume":"26","author":"Hart","year":"2001","journal-title":"Optics Letter"},{"key":"10.1016\/j.jss.2012.06.015_bib0065","series-title":"Proceedings of 4th IEEE\/ASME International Confernece of Mechatronic and Embedded System and Application","first-page":"59","article-title":"Variable Threshold based reversible watermarking: hiding depth maps","author":"Khan","year":"2008"},{"key":"10.1016\/j.jss.2012.06.015_bib0070","doi-asserted-by":"crossref","unstructured":"Khan, A., Malik, S.A., Ali, A., Chamlawi, R., Hussain, M., Mahmood, M.T., Usman, I. Intelligent reversible watermarking and authentication: hiding depth map information for 3D cameras. Information Sciences, http:\/\/dx.doi.org\/10.1016\/j.ins.2012.06.014, in press.","DOI":"10.1109\/TSMCB.2006.873185"},{"issue":"6","key":"10.1016\/j.jss.2012.06.015_bib0075","doi-asserted-by":"crossref","first-page":"1407","DOI":"10.1109\/TIFS.2007.905146","article-title":"Coevolutionary particle swarm optimization using Gaussian distribution for solving constrained optimization problems","volume":"36","author":"Krohling","year":"2006","journal-title":"IEEE Transactions on Systems, Man, Cybernetics Part B: Cybernetics"},{"issue":"3","key":"10.1016\/j.jss.2012.06.015_bib0080","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.asoc.2009.08.031","article-title":"Reversible image watermarking based on integer-to-integer wavelet transform","volume":"2","author":"Lee","year":"2007","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.jss.2012.06.015_bib0085","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1007\/s00726-011-0902-6","article-title":"Hybridizing particle swarm optimization with differential evolution for constrained numerical and engineering optimization","volume":"10","author":"Liu","year":"2010","journal-title":"Applied Soft Computing"},{"issue":"5","key":"10.1016\/j.jss.2012.06.015_bib0090","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.1007\/s00726-011-0902-6","article-title":"GPCR-MPredictor: multi-level prediction of G protein-coupled receptors using genetic ensemble","volume":"42","author":"Naveed","year":"2012","journal-title":"Amino Acids"},{"key":"10.1016\/j.jss.2012.06.015_bib0095","series-title":"Conference on Optical 3D Measurement Techniques","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/359340.359342","article-title":"A 3D time of flight camera for object detection","author":"Ringbeck","year":"2007"},{"issue":"2","key":"10.1016\/j.jss.2012.06.015_bib0100","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/S1386-5056(01)00135-6","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"issue":"2\u20133","key":"10.1016\/j.jss.2012.06.015_bib0105","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.jss.2009.12.026","article-title":"The present and future of telemedicine in Japan","volume":"61","author":"Takahashi","year":"2001","journal-title":"Journal of Medical Informatics"},{"key":"10.1016\/j.jss.2012.06.015_bib0110","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Robust lossless image watermarking based on \u03b1-trimmed mean algorithm and support vector machine","volume":"83","author":"Tsai","year":"2010","journal-title":"Journal of Systems and Software"},{"issue":"8","key":"10.1016\/j.jss.2012.06.015_bib0115","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1016\/j.asoc.2009.08.004","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"10.1016\/j.jss.2012.06.015_bib0120","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.asoc.2009.08.004","article-title":"BCH coding and intelligent watermark embedding: employing both frequency and strength selection","volume":"10","author":"Usman","year":"2010","journal-title":"Applied Soft computing"},{"key":"10.1016\/j.jss.2012.06.015_bib0125","series-title":"Proceedings of IEEE International Conference on Multimedia and Expo","first-page":"1520","article-title":"Lossless data hiding using integer wavelet transform and threshold embedding technique","author":"Xuan","year":"2005"},{"key":"10.1016\/j.jss.2012.06.015_bib0130","series-title":"Proceedings 2006 IEEE Congress on Evolutionary Computation","first-page":"223","article-title":"Constrained single-objective optimization using differential evolution","author":"Zielinski","year":"2006"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121212001719?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121212001719?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T03:46:34Z","timestamp":1551930394000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121212001719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":26,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["S0164121212001719"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2012.06.015","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2012,11]]}}}