iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-030-23381-5_2
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:19:19Z","timestamp":1726031959016},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030233808"},{"type":"electronic","value":"9783030233815"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23381-5_2","type":"book-chapter","created":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T19:09:30Z","timestamp":1560798570000},"page":"16-30","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On Efficiency of Scrambled Image Forensics Service Using Support Vector Machine"],"prefix":"10.1007","author":[{"given":"Sahibzada Muhammad","family":"Shuja","sequence":"first","affiliation":[]},{"given":"Raja Farhat Makhdoom","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Hasan Ali","family":"Khattak","sequence":"additional","affiliation":[]},{"given":"Assad","family":"Abbass","sequence":"additional","affiliation":[]},{"given":"Samee U.","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,18]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Min, L., Ting, L., Yu-Jie, H.: Arnold transform based image scrambling method. In: Proceedings of 3rd International Conference on Multimedia Technology (ICMT 2013) (2013). https:\/\/doi.org\/10.2991\/icmt-13.2013.160","DOI":"10.2991\/icmt-13.2013.160"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Lowe, D.: Object recognition from local scale-invariant features. In: Proceedings of the Seventh IEEE International Conference on Computer Vision (1999). https:\/\/doi.org\/10.1109\/iccv.1999.790410","DOI":"10.1109\/iccv.1999.790410"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Rublee, E., Rabaud, V., Konolige, K., Bradski, G.: ORB: an efficient alternative to SIFT or SURF. In: 2011 International Conference on Computer Vision (2011). https:\/\/doi.org\/10.1109\/iccv.2011.6126544","DOI":"10.1109\/iccv.2011.6126544"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Peter, A., Hartmann, T., Muller, S., Katzenbeisser, S.: Privacy preserving architecture for forensic image recognition. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (2012). https:\/\/doi.org\/10.1109\/wifs.2012.6412629","DOI":"10.1109\/wifs.2012.6412629"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Srinivasan, S.: Security and privacy in the computer forensics context. In: 2006 International Conference on Communication Technology (2006). https:\/\/doi.org\/10.1109\/icct.2006.341936","DOI":"10.1109\/icct.2006.341936"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Law, F.Y., et al.: Protecting digital data privacy in computer forensic examination. In: 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (2011). https:\/\/doi.org\/10.1109\/sadfe.2011.15","DOI":"10.1109\/sadfe.2011.15"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Ito, I., Kiya, H.: Phase scrambling for blind image matching. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing (2009). https:\/\/doi.org\/10.1109\/icassp.2009.4959885","DOI":"10.1109\/icassp.2009.4959885"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"A comprehensive survey on image scrambling techniques. Int. J. Sci. Res. (IJSR) 4(12), 813\u2013818 (2015). https:\/\/doi.org\/10.21275\/v4i12.nov152034","DOI":"10.21275\/v4i12.nov152034"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Shelke, R., Metkar, S.: Image scrambling methods for digital image encryption. In: 2016 International Conference on Signal and Information Processing (IConSIP) (2016). https:\/\/doi.org\/10.1109\/iconsip.2016.7857449","DOI":"10.1109\/iconsip.2016.7857449"},{"issue":"11","key":"2_CR10","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/tip.2012.2204272","volume":"21","author":"C Hsu","year":"2012","unstructured":"Hsu, C., Lu, C., Pei, S.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21(11), 4593\u20134607 (2012). https:\/\/doi.org\/10.1109\/tip.2012.2204272","journal-title":"IEEE Trans. Image Process."},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11744023_32","volume-title":"Computer Vision \u2013 ECCV 2006","author":"H Bay","year":"2006","unstructured":"Bay, H., Tuytelaars, T., Van Gool, L.: SURF: speeded up robust features. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3951, pp. 404\u2013417. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11744023_32"},{"key":"2_CR12","unstructured":"Karami, E., Prasad, S., Shehata, M.: Image matching using SIFT, SURF, BRIEF, and ORB: performance comparison for distorted images. In: Proceedings of the 2015 Newfoundland Electrical and Computer Engineering Conference. St. Johns, Canada (2015)"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Wu, L., Zhang, J., Deng, W., He, D.: Arnold transformation algorithm and anti-arnold transformation algorithm. In: 2009 First International Conference on Information Science and Engineering (2009). https:\/\/doi.org\/10.1109\/icise.2009.347","DOI":"10.1109\/icise.2009.347"},{"key":"2_CR14","unstructured":"Support vector machine, 21 June 2018. https:\/\/en.wikipedia.org\/wiki\/Support_vector_machine"},{"key":"2_CR15","unstructured":"Baryamureeba, V., Tushabe, F.: The enhanced digital investigation process model. In: The Digital Forensic Research Conference (2004)"}],"container-title":["Lecture Notes in Computer Science","Services \u2013 SERVICES 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23381-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T06:14:39Z","timestamp":1710310479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23381-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030233808","9783030233815"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23381-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SERVICES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Congress on Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"services2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.servicescongress.org\/2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}