{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:23:40Z","timestamp":1721003020558},"reference-count":32,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET biom."],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1049\/iet-bmt.2012.0052","type":"journal-article","created":{"date-parts":[[2013,5,15]],"date-time":"2013-05-15T00:02:49Z","timestamp":1368576169000},"page":"21-27","source":"Crossref","is-referenced-by-count":33,"title":["Singular value decomposition and wavelet\u2010based iris biometric watermarking"],"prefix":"10.1049","volume":"2","author":[{"given":"Swanirbhar","family":"Majumder","sequence":"first","affiliation":[{"name":"Department of ECE NERIST (Deemed University) Arunachal Pradesh India"}]},{"given":"Kharibam","family":"Jilenkumari Devi","sequence":"additional","affiliation":[{"name":"Department of ECE NERIST (Deemed University) Arunachal Pradesh India"}]},{"given":"Subir Kumar","family":"Sarkar","sequence":"additional","affiliation":[{"name":"Department of ETCE Jadavpur University West Bengal India"}]}],"member":"265","published-online":{"date-parts":[[2013,3]]},"reference":[{"key":"e_1_2_8_2_1","first-page":"15","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"Katzenbeisser S.","year":"2000"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/6046.985560"},{"key":"e_1_2_8_4_1","first-page":"15","volume-title":"Information hiding, steganography","author":"Johnson N.F.","year":"2003"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.192463"},{"key":"e_1_2_8_6_1","unstructured":"Zhu X. Zhao J. Xu H.: \u2018A digital watermarking algorithm and implementation based on improved SVD watermarking\u2010attacks and counter measures\u2019.Proc. 18th IEEE Computer Society Int. Conf. Pattern Recognition (ICPR'06)"},{"key":"e_1_2_8_7_1","volume-title":"Bachelor thesis for School of Computer Science and Software Engineering","author":"Masek L.","year":"2003"},{"key":"e_1_2_8_8_1","volume-title":"la couleur de iris","author":"Bertillon A.","year":"1985"},{"key":"e_1_2_8_9_1","volume-title":"Iris recognition using rotational complex wavelet filters","author":"Bodade R.M.","year":"2008"},{"key":"e_1_2_8_10_1","unstructured":"Yao P. Li J. Ye X. Zhang Z. Li B.: \u2018Iris recognition algorithm using modified log\u2010gabor filters\u2019.IEEE 18th Int. Conf. Pattern Recognition 2006"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20000468"},{"key":"e_1_2_8_12_1","unstructured":"Daugman J.: \u2018How iris recognition works\u2019.Proc. of 2002 Int. Conf. on Image Processing 2002 vol.1"},{"key":"e_1_2_8_13_1","unstructured":"Daugman J.: \u2018Biometric personal identification system based on iris analysis\u2019.United States Patent Patent Number: 5 291 560 1994"},{"key":"e_1_2_8_14_1","unstructured":"Wildes R. Asmuth J. Green G.et al: \u2018A system for automated iris recognition\u2019.Proc. IEEE Workshop on Applications of Computer Vision Sarasota FL 1994 pp.121\u2013128"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628669"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.668573"},{"issue":"2","key":"e_1_2_8_17_1","article-title":"Efficient iris recognition through improvement of feature vector and classifier","volume":"23","author":"Lim S.","year":"2001","journal-title":"ETRI J."},{"key":"e_1_2_8_18_1","unstructured":"Noh S. Pae K. Lee C. Kim J.: \u2018Multiresolution independent component analysis for iris identification\u2019.2002 Int. Technical Conf. Circuits\/Systems Computers and Communications Phuket Thailand 2002"},{"key":"e_1_2_8_19_1","doi-asserted-by":"crossref","unstructured":"Monro D.M. Zhang D.: \u2018An effective human Iris code with low complexity\u2019.Proc. IEEE Int. Conf. on Image Processing September2005 vol.3 pp.277\u2013280","DOI":"10.1109\/ICIP.2005.1530382"},{"key":"e_1_2_8_20_1","unstructured":"Rakshit S. Monro D.M.: \u2018Effects of sampling and compression on human Iris verification\u2019.Proc. IEEE Int. Conf. on Acoustics Speech and Signal Processing May2006 vol.2 no. II pp.337\u2013340"},{"key":"e_1_2_8_21_1","unstructured":"Chinese Academy of Sciences \u2013 Institute of Automation. Database of 756 Greyscale Eye Images. Available athttp:\/\/www.sinobiometrics.comVersion 1.0 2003"},{"key":"e_1_2_8_22_1","volume-title":"Database of 120 Greyscale eye images","author":"Barry C.","year":"1999"},{"key":"e_1_2_8_23_1","doi-asserted-by":"crossref","unstructured":"Dong J. Tan T.: \u2018Effects of watermarking on iris recognition performance\u2019.Proc. 10th Int. Conf. Control Automation Robotics and Vision 2008 ICARCV 2008 p.1156.","DOI":"10.1109\/ICARCV.2008.4795684"},{"key":"e_1_2_8_24_1","first-page":"623","volume-title":"Handbook of research on computational intelligence for engineering, science and business","author":"Majumder S.","year":"2030"},{"key":"e_1_2_8_25_1","volume-title":"Advanced information security technology: watermarking and biometrics","author":"Zhao Q.","year":"2009"},{"key":"e_1_2_8_26_1","doi-asserted-by":"crossref","unstructured":"Varbanov G. Blagoev P.: \u2018An improving model watermarking with iris biometric code\u2019.Int. Conf. on Computer Systems and Technologies \u2013 CompSysTech'07 2007","DOI":"10.1145\/1330598.1330703"},{"issue":"3","key":"e_1_2_8_27_1","first-page":"161","article-title":"Multidimensional multimetric novel and simple techniques for iris recognition system","volume":"3","author":"Kalita R.","year":"2010","journal-title":"Int. J. Recent Trends Eng."},{"issue":"5","key":"e_1_2_8_28_1","first-page":"72","article-title":"Robust SVD DCT based watermarking for copyright protection","volume":"10","author":"Sverdlovsk A.","year":"2001","journal-title":"EEE Trans. Image Process."},{"key":"e_1_2_8_29_1","unstructured":"Majumder S. Singh A.D. Mishra M.: \u2018A GUI based Iris authentication system for secured access\u2019.Int. Conf. Systemics Cybernetics Informatics (ICSCI\u20102009) under Pentagram Research Hyderabad held 7\u201310 January 2009 CC2.6 pp.147\u2013151"},{"key":"e_1_2_8_30_1","doi-asserted-by":"crossref","unstructured":"Majumder S. Das T.S. Mankar V.H. Sarkar S.K.: \u2018SVD and error control coding based digital image watermarking\u2019.ID 61 Int. Conf. on Advances in Computing Control and Telecommunication Technologies' 2009 (ACT 2009) organized by ACEEE and published by IEEE Computer Society held at Trivendrum India pp.60\u201363.","DOI":"10.1109\/ACT.2009.25"},{"key":"e_1_2_8_31_1","unstructured":"Saikia M. Majumder S. Das T.S. Hussain Md.A. Sarkar S.K.: \u2018Coded fingerprinting based watermarking to resist collusion attacks and trace colluders\u2019.Proc. Int. Conf. in Advances in Computer Engineering (ACE\u20102010) pp.120\u2013124doi:10.1109\/ACE.2010.36published by IEEE CS DL on 21 and 22 June 2010 in Bangalore"},{"key":"e_1_2_8_32_1","volume-title":"Digital communications: fundamentals and applications","author":"Sklar B.","year":"1988"},{"key":"e_1_2_8_33_1","volume-title":"Error control systems for digital communication and storage","author":"Wicker S.B.","year":"1995"}],"container-title":["IET Biometrics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-bmt.2012.0052","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-bmt.2012.0052","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-bmt.2012.0052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T06:58:12Z","timestamp":1612767492000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-bmt.2012.0052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["10.1049\/iet-bmt.2012.0052"],"URL":"https:\/\/doi.org\/10.1049\/iet-bmt.2012.0052","archive":["Portico"],"relation":{},"ISSN":["2047-4938","2047-4946"],"issn-type":[{"value":"2047-4938","type":"print"},{"value":"2047-4946","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3]]}}}