{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:23:57Z","timestamp":1725701037430},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361313","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0659-0664","source":"Crossref","is-referenced-by-count":0,"title":["Dual Watermarking Based on DCT with Human Visual Characteristics for Authentication and Copyright Protection"],"prefix":"10.1109","author":[{"given":"Ferda","family":"Ernawan","sequence":"first","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Malaysia"}]},{"given":"Wong Shu","family":"Jie","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Malaysia"}]},{"given":"Suraya Abu","family":"Bakar","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Malaysia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07941-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-013-0217-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.06.011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2020.1031.18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCT.2018.8529638"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2013.100"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2007.4511047"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FGCN.2008.213"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2013.17"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103062"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169280"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2633878"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8840779"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361313.pdf?arnumber=10361313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:44:34Z","timestamp":1705092274000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361313\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361313","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}