{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T06:07:18Z","timestamp":1744265238436},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540671824"},{"type":"electronic","value":"9783540465140"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719724_22","type":"book-chapter","created":{"date-parts":[[2006,12,28]],"date-time":"2006-12-28T21:07:17Z","timestamp":1167340037000},"page":"318-332","source":"Crossref","is-referenced-by-count":12,"title":["Recovery of Watermarks from Distorted Images"],"prefix":"10.1007","author":[{"given":"Neil F.","family":"Johnson","sequence":"first","affiliation":[]},{"given":"Zoran","family":"Duric","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"22_CR1","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"S. Craver","year":"1998","unstructured":"Craver, S., Memon, N., Yeo, B., Yeung, N.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas in Communications\u00a016(4), 573\u2013586 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"22_CR2","unstructured":"Diagimarc corporation PictureMarcTM, MarcSpiderTM, \n                    \n                      http:\/\/www.digimarc.com"},{"key":"22_CR3","unstructured":"Duric, Z., Johnson, N.F., Jajodia, S.: Recovering Watermarks from Images. IEEE Transactions on Image Processing (1999) (submitted to)"},{"key":"22_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03477-4","volume-title":"Digital Image Processing","author":"B. Jahne","year":"1997","unstructured":"Jahne, B.: Digital Image Processing, 4th edn. Springer, Heidelberg (1997)","edition":"4"},{"key":"22_CR5","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: A Role for Digital Watermarking in Electronic Commerce. ACM Computing Surveys (1999)"},{"key":"22_CR6","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: On Fingerprinting Images for Recognition. In: To appear Fifth International Workshop on Multimedia Information Systems (MIS 1999), Indian Wells, California (1999)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_19","volume-title":"Information Hiding","author":"N.F. Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis of Images Created using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, Springer, Heidelberg (1998)"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"F. Petitcolas","year":"1998","unstructured":"Petitcolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, p. 218. Springer, Heidelberg (1998)"},{"key":"22_CR9","volume-title":"Introduction to Matrix Computations","author":"G.W. Stewart","year":"1973","unstructured":"Stewart, G.W.: Introduction to Matrix Computations. Academic Press, New York (1973)"},{"key":"22_CR10","volume-title":"Introductory Techniques for 3-D Computer Vision","author":"E. Trucco","year":"1998","unstructured":"Trucco, E., Verri, A.: Introductory Techniques for 3-D Computer Vision. Prentice-Hall, Englewood Cliffs (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719724_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T12:23:55Z","timestamp":1553343835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719724_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540671824","9783540465140"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/10719724_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}