{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:44:13Z","timestamp":1729622653781,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/ised.2011.37","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T14:30:14Z","timestamp":1325860214000},"page":"347-351","source":"Crossref","is-referenced-by-count":3,"title":["A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD)"],"prefix":"10.1109","author":[{"given":"J.K.","family":"Mandal","sequence":"first","affiliation":[]},{"given":"A.","family":"Khamrui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Fundamentals of Software Engineering","year":"0","author":"mall","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20059022"},{"journal-title":"The USC-SIPI Image Database Version 5","year":"1997","author":"weber","key":"15"},{"key":"16","first-page":"19","article-title":"A Data Embedding Technique for Gray Scale Image Using Genetic Algorithm (DEGGA)","author":"mandal","year":"2011","journal-title":"IEEE Sponsored International Conference on Communication Computing & Security"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.26"},{"key":"14","doi-asserted-by":"crossref","first-page":"24","DOI":"10.22452\/mjcs.vol21no1.3","article-title":"A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT)","volume":"21","author":"ghoshal","year":"2008","journal-title":"Malaysian Journal of Computer Science"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.808134"},{"key":"12","first-page":"18","article-title":"Multivariate entropy detector based hybrid image registration algorithm","author":"pavan","year":"2005","journal-title":"IEEE Int Conf on Acoustics Speech and Signal Processing Philadelphia Pennsylvania USA"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(00)00015-7"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.05.006"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926097"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.812753"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.223.232"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2009.4809168"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2008.4760437"},{"key":"4","first-page":"1","article-title":"A Bit Level Image Authentication \/ Secrete Message Transmission Technique (BLIA\/SMTT)","volume":"51","author":"ghoshal","year":"2008","journal-title":"AMSE Journal of Signal Processing and Pattern Recognition"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958299"},{"key":"8","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1117\/12.298462","article-title":"A robust image authentication method surviving JPEG lossy compression","volume":"3312","author":"lin","year":"1998","journal-title":"Proc SPIE"}],"event":{"name":"2011 International Symposium on Electronic System Design (ISED)","start":{"date-parts":[[2011,12,19]]},"location":"Kochi, Kerala, India","end":{"date-parts":[[2011,12,21]]}},"container-title":["2011 International Symposium on Electronic System Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6117294\/6117297\/06117300.pdf?arnumber=6117300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:49:37Z","timestamp":1602672577000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6117300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ised.2011.37","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}