skip to main content
research-article

Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents

Authors Info & Claims
Published:13 January 2021Publication History
Skip Abstract Section

Abstract

Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. To achieve this, in this article, we propose a joint encryption then-compression based watermarking technique for digital document security. This technique offers a tool for confidentiality, copyright protection, and strong compression performance of the system. The proposed method involves three major steps as follows: (1) embedding of multiple watermarks through non-sub-sampled contourlet transform, redundant discrete wavelet transform, and singular value decomposition; (2) encryption and compression via SHA-256 and Lempel Ziv Welch (LZW), respectively; and (3) extraction/recovery of multiple watermarks from the possibly distorted cover image. The performance estimations are carried out on various images at different attacks, and the efficiency of the system is determined in terms of peak signal-to-noise ratio (PSNR) and normalized correlation (NC), structural similarity index measure (SSIM), number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and compression ratio (CR). Furthermore, the comparative analysis of the proposed system with similar schemes indicates its superiority to them.

References

  1. Chauhan Digvijay Singh, A. K. Singh, B. Kumar, and J. P. Saini. 2019. Quantization based multiple medical information watermarking for secure e-health. Multimedia Tools and Applications 78, 4 (2019), 3911--3923.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Yao Yuanzhi, Weiming Zhang, Hui Wang, Hang Zhou, and Nenghai Yu. 2019. Content-adaptive reversible visible watermarking in encrypted images. Signal Processing 164 (2019), 386--401.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Anand and A. K. Singh. 2020. Joint watermarking-encryption-ECC for patient record security in wavelet domain. IEEE MultiMedia 27 (2020), 66--75. DOI:10.1109/MMUL.2020.2985973Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. P. Mohanty, A. Sengupta, P. Guturu, and E. Kougianos. 2017. Everything you want to know about watermarking: From paper marks to hardware protection. IEEE Consumer Electronics Magazine 6, 3 (2017), 83--91.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. Anand and A. K. Singh. 2020. Watermarking techniques for medical data authentication: A survey. Multimedia Tools and Applications, DOI:10.1007/s11042-020-08801-0Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. K. Singh, B. Kumar, S. K. Singh, M. Dave, V. K Singh, P. Kumar, S. P. Ghrera, P. K Gupta, and A. Mohan. Guest editorial: Robust and secure data hiding techniques for telemedicine applications. Multimedia Tools and Applications 76, 5 (2017), 7563--7573.Google ScholarGoogle Scholar
  7. S. Thakur, A. K. Singh, S. P. GhreraM Dave. 2018. Watermarking techniques and its applications in tele-health: A technical survey. In Cryptographic and Information Security Approaches for Images and Videos, S. Ramakrishnan (ed.) CRC Press, 467--508.Google ScholarGoogle Scholar
  8. R. Srivastava, B. Kumar, A. K. Singh, and A. Mohan. 2018. Computationally efficient joint imperceptible image watermarking and JPEG compression: A green computing approach. Multimedia Tools and Applications 77, 13 (2018), 16447--16459Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Priya, R. Varatharajan, G. Manogaran, R. Sundarasekar, and P. M. Kumar. 2018. Paillierhomomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal and Ubiquitous Computing 1--11, 2018. DOI:https://doi.org/10.1007/s00779-018-1131-8Google ScholarGoogle Scholar
  10. C. Lakshmi, K. Thenmozhi, J. B. Rayappan, and R. Amirtharajan. 2018. Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains. Computer Methods and Programs in Biomedicine 159, 11--21, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  11. Xun Yijing, Zhijiang Li, XiaoluZhong, Sheng Li, Jiawang Su, and Ke Zhang. 2019. Dual anti-counterfeiting of QR code based on information encryption and digital watermarking. In Advances in Graphic Communication, Printing and Packaging 187--196. Singapore, 2019.Google ScholarGoogle Scholar
  12. Mohamed A. Bhnassy, Esam A. A. Hagras, El-Sayed A. El-Badawy, Mohamed A. Mokhtar, and Moustafa H. Aly. 2019. Image encryption and watermarking combined dynamic chaotic hopping pattern with double random phase encoding DRPE. Optical and Quantum Electronics 51, 7 (2019), 246.Google ScholarGoogle ScholarCross RefCross Ref
  13. Rhayma Hanen, Achraf Makhloufi, and Ahmed ben Hmida. 2018. Robust watermarking scheme integrated into JPWL based on turbo-trellis-coded quantization. In 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 1--6. IEEE, 2018.Google ScholarGoogle Scholar
  14. Huynh Ngoc-Tu, K. Bharanitharan, Chin-Chen Chang, and Yanjun Liu. 2018. Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images. Multimedia Tools and Applications 77, 5 (2018), 5767--5783.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sun Lin, Jiucheng Xu, Shangwang Liu, Shiguang Zhang, Yuan Li, and Chang'an Shen. 2018. A robust image watermarking scheme using arnold transform and BP neural network. Neural Computing and Applications 30, 8 (2018), 2425--2440.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Singh Priyanka, Balasubramanian Raman, and ParthaPratim Roy. 2017. A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform. Multimedia Tools and Applications 76, 3 (2017), 3871--3897.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Aparna Puvvadi, and PolurieVenkata Vijay Kishore. 2018. Biometric-based efficient medical image watermarking in E-healthcare application. IET Image Processing 13, 3 (2018), 421--428.Google ScholarGoogle Scholar
  18. S. Singh, V. S. Rathore, R. Singh and M. K. Singh. 2017. Hybrid semi-blind image watermarking in redundant wavelet domain. Multimedia Tools and Applications 76, 18 (2017), 19113--37.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chandel Sonali, Wenxuan Cao, Zijing Sun, Jiayi Yang, Bailu Zhang, and Tian-Yi Ni. 2019. A multi-dimensional adversary analysis of RSA and ECC in blockchain encryption. In Future of Information and Communication Conference 988--1003. Springer, Cham, 2019.Google ScholarGoogle Scholar
  20. Omari Mohammed and SouleymaneOuledJaafri. 2019. Application of image compression to multiple-shot pictures using similarity norms with three level blurring. CMC-Computers Materials 8 Continua 59, 3 (2019), 753--775.Google ScholarGoogle Scholar
  21. A. Anand, A. K. Singh, Z. Lv, and G. Bhatnagar. 2020. Compression-then-encryption based secure watermarking technique for smart healthcare system. IEEE Multimedia 27, 4 (2020), 133--143. DOI:10.1109/MMUL.2020.2993269Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kumar Manoj and Ankita Vaish. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60 (2017), 81--89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Singh Siddharth, Vivek Singh Rathore, and Rajiv Singh. 2017. Hybrid NSCT domain multiple watermarking for medical images. Multimedia Tools and Applications 76, 3 (2017), 3557--3575.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Haddad Sahar, Gouenou Coatrieux, and Michel Cozic. 2018. A new joint watermarking-encryption-JPEG-LS compression method for a priori 8 a posteriori image protection. In 2018 25th IEEE International Conference on Image Processing (ICIP), 1688--1692. IEEE, 2018.Google ScholarGoogle Scholar
  25. Liu Hong, Di Xiao, Rui Zhang, Yushu Zhang, and SenBai. 2016. Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Processing: Image Communication 45, (2016), 41--51.Google ScholarGoogle Scholar
  26. Mary S. J. Jereesha, C. Seldev Christopher, and S. Sebastin Antony Joe. 2016. Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits and Systems 7, 08 (2016), 1722.Google ScholarGoogle ScholarCross RefCross Ref
  27. Xiao Di, Yanting Chang, Tao Xiang, and SenBai. 2017. A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimedia Tools and Applications 76, 7 (2017), 9265--9296.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Thakur, A. K. Singh, S. P. Ghrera, and A. Mohan. 2018. Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications 79 (2018), 1--14.Google ScholarGoogle Scholar
  29. A. K. Singh. 2017. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications 76, 6 (2017), 8881--900.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. A. Zear, A. K. Singh, and P. Kumar. 2018. A proposed secure multiple watermarking technique based on DWT, DCT, and SVD for application in medicine. Multimedia Tools and Applications 77, 4 (2018), 4863--82.Google ScholarGoogle ScholarCross RefCross Ref
  31. S. Thakur, A. K. Singh, and S. P. Ghrera. 2018. NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images. Concurrency and Computation: Practice and Experience (2018): e5108.Google ScholarGoogle Scholar
  32. S. Singh, V. S. Rathore, R. Singh, and M. K. Singh. 2017. Hybrid semi-blind image watermarking in redundant wavelet domain. Multimedia Tools and Applications 76, 18 (2017), 19113--37.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Reem A. Alotaibi and Lamiaa A. Elrefaei. 2019. Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Applied Computing and Informatics 15, 2 (2019), 191--202.Google ScholarGoogle ScholarCross RefCross Ref
  34. Li Jingbing and Fan Wu. 2013. Robust watermarking for text images based on Arnold scrambling and DWT-DFT. In 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), 1182--1186. IEEE, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  35. Wu Fan and Jingbing Li. 2015. Robust watermarking for text images based on Arnold scrambling and DWT-DCT. In 2015 International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC-15). Atlantis Press, 2015.Google ScholarGoogle Scholar
  36. Laouamer Lamri and Omar Tayan. 2015. A semi-blind robust DCT watermarking approach for sensitive text images. Arabian Journal for Science and Engineering 40, 4 (2015), 1097--1109.Google ScholarGoogle ScholarCross RefCross Ref
  37. Laouamer Lamri and Omar Tayan. 2013. An enhanced SVD technique for authentication and protection of text-images using a case study on digital quran content with sensitivity constraints. Life Science Journal 10, 2 (2013), 2591--2597.Google ScholarGoogle Scholar
  38. Gao Hang and TiegangGao. 2019. Double verifiable image encryption based on chaos and reversible watermarking algorithm. Multimedia Tools and Applications 78, 6 (2019), 7267--7288.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Chen Jun-xin, Zhi-liang Zhu, Chong Fu, Li-bo Zhang, and Yushu Zhang. 2015. An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dynamics 81, 3 (2015), 1151--1166.Google ScholarGoogle ScholarCross RefCross Ref
  40. Fridrich Jiri. 1998. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8, 06 (1998), 1259--1284.Google ScholarGoogle ScholarCross RefCross Ref
  41. Gao Tiegang and Zengqiang Chen. 2008. A new image encryption algorithm based on hyper-chaos. Physics Letters A 372, 4 (2008), 394--400.Google ScholarGoogle ScholarCross RefCross Ref
  42. Hu Ting, Ye Liu, Li-Hua Gong, Shao-Feng Guo, and Hong-Mei Yuan. 2017. Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Processing 134 (2017), 234--243.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Liu Quan, Pei-yue Li, Ming-chao Zhang, Yong-xin Sui, and Huai-jiang Yang. 2015. A novel image encryption algorithm based on chaos maps with Markov properties. Communications in Nonlinear Science and Numerical Simulation 20, 2 (2015), 506--515.Google ScholarGoogle ScholarCross RefCross Ref
  44. Wang Xingyuan and Hui-li Zhang. 2015. A color image encryption with heterogeneous bit-permutation and correlated chaos. Optics Communications 342 (2015), 51--60.Google ScholarGoogle ScholarCross RefCross Ref
  45. Wang Xingyuan and Hui-li Zhang. 2016. A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics 83, 1–2 (2016), 333--346.Google ScholarGoogle Scholar
  46. Xu Lu, Zhi Li, Jian Li, and Wei Hua. 2016. A novel bit-level image encryption algorithm based on chaotic maps. Optics and Lasers in Engineering 78 (2016), 17--25.Google ScholarGoogle ScholarCross RefCross Ref
  47. S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, Naveen Chilamkurti, and R. Logesh. 2019. SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139 (2019), 426--437.Google ScholarGoogle ScholarCross RefCross Ref
  48. Chang Chin-Chen, Yi-Pei Hsieh, and Chia-Hsuan Lin. 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 3130--3137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Wu Chia-Chun, Shang-Juh Kao, and Min-Shiang Hwang. 2011. A high quality image sharing with steganography and adaptive authentication scheme. Journal of Systems and Software 84, 12 (2011), 2196--2207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Kanan Hamidreza Rashidy and Bahram Nazeri. 2014. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications 41, 14 (2014), 6123--6130.Google ScholarGoogle ScholarCross RefCross Ref
  51. Bamal Roopam and Singara Singh Kasana. 2019. Dual hybrid medical watermarking using Walsh-Slantlet transform. Multimedia Tools and Applications 78 (2019), 17899--17927.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Adnan M. Alattar. 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing 13, 8 (2004), 1147--1156.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Frank Y. Shih and Xin Zhong. 2016. High-capacity multiple regions of interest watermarking for medical images. Information Sciences 367 (2016), 648--659.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Frank Y. Shih and Yi-Ta Wu. 2005. Robust watermarking and compression for medical images based on genetic algorithms. Information Sciences 175, 3 (2005), 200--216.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Diljith M. Thodi and Jeffrey J. Rodríguez. 2007. Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing 16, 3 (2007), 721--730.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Tian Jun. 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13, 8 (2003), 890--896.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Wakatani Akiyoshi. 2002. Digital watermarking for ROI medical images by using compressed signature image. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, 2043--2048.Google ScholarGoogle Scholar
  58. Wang Zhi-Hui, Chin-Feng Lee, and Ching-Yun Chang. 2013. Histogram-shifting-imitated reversible data hiding. Journal of Systems and Software 86, 2 (2013), 315--323.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Zain Jasni Mohamad, and Malcolm Clarke. 2011. Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Arxiv Preprint Arxiv:1101.1603 (2011).Google ScholarGoogle Scholar
  60. Zhao Zhenfei, Hao Luo, Zhe-Ming Lu, and Jeng-Shyang Pan. 2011. Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-International Journal of Electronics and Communications 65, 10 (2011), 814--826.Google ScholarGoogle ScholarCross RefCross Ref
  61. Bamal Roopam and Singara Singh Kasana. 2018. Slantlet based hybrid watermarking technique for medical images. Multimedia Tools and Applications 77, 10 (2018), 12493--12518.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Amiri Mehran Deljavan, Majid Meghdadi, and Ali Amiri. 2019. HVS-based scalable image watermarking. Multimedia Tools and Applications 78, 6 (2019), 7097--7124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Ferdinando Di Martino and Salvatore Sessa. 2019. Fragile watermarking tamper detection via bilinear fuzzy relation equations. Journal of Ambient Intelligence and Humanized Computing 10, 5 (2019), 2041--2061.Google ScholarGoogle ScholarCross RefCross Ref
  64. Ferdinando Di Martino and Salvatore Sessa. 2012. Fragile watermarking tamper detection with images compressed by fuzzy transform. Information Sciences 195 (2012), 62--90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Chen Wei-Che and Ming-Shi Wang. 2009. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems with Applications 36, 2 (2009), 1300--1307.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Y-F. Chang and W-L. Tai. 2013. A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electronics Review 21, 2 (2013), 182--190.Google ScholarGoogle ScholarCross RefCross Ref
  67. Singh Durgesh and Sanjay K. Singh. 2017. DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools and Applications 76, 1 (2017), 953--977.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Steve Walton. 1995. Information authentication for a slippery new age. Dr. Dobbs Journal (1995), 18--26.Google ScholarGoogle Scholar
  69. Ansari Irshad Ahmad, Millie Pant, and Chang WookAhn. 2016. SVD based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics 7, 6 (2016), 1225--1239.Google ScholarGoogle ScholarCross RefCross Ref
  70. Gul Ertugrul and Serkan Ozturk. 2019. A novel hash function based fragile watermarking method for image integrity. Multimedia Tools and Applications 78 (2019), 17701--17718.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. K. Swaraja, K. Meenakshi, and PadmavathiKora. 2020. An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomedical Signal Processing and Control 55 (2020), 101665.Google ScholarGoogle ScholarCross RefCross Ref
  72. Shabir A. Parah, Javaid A. Sheikh, Farhana Ahad, Nazir A. Loan, and Ghulam Mohiuddin Bhat. 2017. Information hiding in medical images: A robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications 76, 8 (2017), 10599--10633.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Run Ray-Shine, Shi-Jinn Horng, Jui-Lin Lai, Tzong-Wang Kao, and Rong-Jian Chen. 2012. An improved SVD-based watermarking technique for copyright protection. Expert Systems with Applications 39, 1 (2012), 673--689.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Talat Naheed, Imran Usman, Tariq M. Khan, Amir H. Dar, and Muhammad Farhan Shafique. 2014. Intelligent reversible watermarking technique in medical images using GA and PSO. Optik-International Journal for Light and Electron Optics 125, 11 (2014), 2515--2525.Google ScholarGoogle ScholarCross RefCross Ref
  75. Thanki Rohit, Ashish Kothari, and DevenTrivedi. 2019. Hybrid and blind watermarking scheme in DCuT–RDWT domain. Journal of Information Security and Applications 46 (2019), 231--249.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Zhang Yifeng, Yingying Li, and Yibo Sun. 2019. Digital watermarking based on joint DWT–DCT and OMP reconstruction. Circuits, Systems, and Signal Processing 38 (2019), 5135--5148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. A. Anand and A. K. Singh. 2020. An improved DWT-SVD domain watermarking for medical information security. Computer Communications 152, 72--80, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  78. Public domain test images. Retrieved from https://homepages.cae.wisc.edu/∼ece533/images/.Google ScholarGoogle Scholar
  79. MedPix searchable online database. Retrieved from https://medpix.nlm.nih.gov/.Google ScholarGoogle Scholar
  80. Y. Wu, J. P. Noonan, S. Agaian. 2011. NPCR and UACI Randomness Tests for Image Encryption”, Cyber Journals: Multidisciplinary Journals in Science and Technology. Journal of Selected Areas in Telecommunications (2011), 31--38.Google ScholarGoogle Scholar

Index Terms

  1. Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 21, Issue 1
      Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
      February 2021
      534 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3441681
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 January 2021
      • Accepted: 1 July 2020
      • Revised: 1 May 2020
      • Received: 1 March 2020
      Published in toit Volume 21, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format