{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:19:27Z","timestamp":1725574767807},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262084"},{"type":"electronic","value":"9783540321064"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11494669_135","type":"book-chapter","created":{"date-parts":[[2011,1,13]],"date-time":"2011-01-13T14:48:09Z","timestamp":1294930089000},"page":"1100-1107","source":"Crossref","is-referenced-by-count":0,"title":["Robust Blind Image Watermarking with Independent Component Analysis: A Embedding Algorithm"],"prefix":"10.1007","author":[{"given":"Juan Jos\u00e9","family":"Murillo-Fuentes","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Boloix-Tortosa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"135_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing\u00a06, 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"key":"135_CR2","doi-asserted-by":"crossref","unstructured":"Noel, S.E., Szu, H.H.: Multimedia authenticity with ICA watermarks. In: Szu, H.H., Vetterli, M., Campbell, W.J., Buss, J.R. (eds.) Proc. SPIE, Wavelet Applications VII, vol.\u00a04056, pp. 175\u2013184 (2000)","DOI":"10.1117\/12.381712"},{"key":"135_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-36617-2_6","volume-title":"Digital Watermarking","author":"D. Yu","year":"2003","unstructured":"Yu, D., Sattar, F.: A new blind watermarking technique based on independent component analysis. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol.\u00a02613, pp. 51\u201363. Springer, Heidelberg (2003)"},{"key":"135_CR4","unstructured":"Liu, J., Zhang, X., Sun, J., Lagunas, M.A.: A digital watermarking scheme based on ICA detection. In: Proc. ICA 2003, Nara, Japan, pp. 215\u2013220 (2003)"},{"key":"135_CR5","unstructured":"Murillo-Fuentes, J., Molina-Bulla, H., Gonz\u00e1lez-Serrano, F.: Independent component analysis applied to digital image watermarking. In: Proc. ICASSP 2001, Salt Lake City, USA, vol.\u00a0III, pp. 1997\u20132000 (2001)"},{"key":"135_CR6","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1162\/jmlr.2003.4.7-8.1471","volume":"4","author":"S. Bounkong","year":"2003","unstructured":"Bounkong, S., Toch, B., Saad, D., Lowe, D.: Ica for watermarking digital images. J. Mach. Learn. Res.\u00a04, 1471\u20131498 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"135_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1007\/978-3-540-30110-3_118","volume-title":"Independent Component Analysis and Blind Signal Separation","author":"J.J. Murillo-Fuentes","year":"2004","unstructured":"Murillo-Fuentes, J.J.: Independent component analysis in the watermarking of digital images. In: Puntonet, C.G., Prieto, A.G. (eds.) ICA 2004. LNCS, vol.\u00a03195, pp. 938\u2013945. Springer, Heidelberg (2004)"},{"key":"135_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/0471221317","volume-title":"Independent component analysis","author":"A. Hyv\u00e4rinen","year":"2001","unstructured":"Hyv\u00e4rinen, A., Karhunen, J., Oja, E.: Independent component analysis. John Willey and Sons, West Sussex (2001)"},{"key":"135_CR9","doi-asserted-by":"publisher","first-page":"3459","DOI":"10.1109\/TSP.2004.837409","volume":"52","author":"J.J. Murillo-Fuentes","year":"2004","unstructured":"Murillo-Fuentes, J.J., Gonz\u00e1lez-Serrano, F.J.: A sinusoidal contrast function for the blind separation of statistically independent sources. IEEE Trans. on Signal Processing\u00a052, 3459\u20133463 (2004)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"135_CR10","first-page":"831","volume-title":"Advances in Neural Information Processing Systems","author":"A.J. Bell","year":"1997","unstructured":"Bell, A.J., Sejnowski, T.J.: Edges are the independent components of natural scenes. In: Mozer, M.C., Jordan, M.I., Petsche, T. (eds.) Advances in Neural Information Processing Systems, vol.\u00a09, p. 831. The MIT Press, Cambridge (1997)"},{"key":"135_CR11","first-page":"58","volume-title":"Advances in Neural Information Processing Systems","author":"T. Lee","year":"1999","unstructured":"Lee, T., Lewicki, M., Sejnowski, T.: Unsupervised classification with non-gaussian mixture models using ICA. In: Advances in Neural Information Processing Systems, vol.\u00a011, pp. 58\u201364. The MIT Press, Cambridge (1999)"},{"key":"135_CR12","doi-asserted-by":"crossref","unstructured":"Hornillo-Mellado, S., Mart\u00edn-Clemente, R., Acha, J.I., Puntonet, C.G.: Application of independent component analysis to edge detection and watermarking. In: Proc. IWANN 2003, Mah\u00f3n, Spain, pp. 270\u2013280 (2003)","DOI":"10.1007\/3-540-44869-1_35"},{"key":"135_CR13","unstructured":"Bugallo, M.F., Dapena, A., Castedo, L.: Image compression via independent component analysis. In: Learning, Legan\u00e9s (2000)"},{"key":"135_CR14","unstructured":"Kerckhopffs, A.: La cryptographie militaire. Journal des Sciences Militaires\u00a0IX, 5-38 (January), 161-191(February) (1883)"},{"key":"135_CR15","doi-asserted-by":"crossref","unstructured":"Mora-Jimenez, I., Navia-Vazquez, A.: A new spread spectrum watermarking method with self-synchronization capabilities. In: Proc. ICIP 2000, Vancouver, BC, Canada (2000)","DOI":"10.1109\/ICIP.2000.900983"},{"key":"135_CR16","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/5.771067","volume":"87","author":"R. Wolfgang","year":"1999","unstructured":"Wolfgang, R., Podilchuk, C., Delp, E.J.: Perceptual watermarks for digital images and video. Proceedings of the IEEE\u00a087, 1108\u20131126 (1999)","journal-title":"Proceedings of the IEEE"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Bioinspired Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11494669_135.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:38:37Z","timestamp":1619505517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11494669_135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262084","9783540321064"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11494669_135","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}