{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T05:20:25Z","timestamp":1736054425595,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282273"},{"type":"electronic","value":"9783540319078"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11538356_79","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:24:05Z","timestamp":1127831045000},"page":"761-770","source":"Crossref","is-referenced-by-count":0,"title":["A Print-Scan Resistable Digital Seal System"],"prefix":"10.1007","author":[{"given":"Yan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ruizhen","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"79_CR1","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L.: The First 50 Years of Electronic Watermarking. EURASIP J. of Applied Signal Processing, 126\u2013132 (2002)","DOI":"10.1155\/S1110865702000525"},{"key":"79_CR2","doi-asserted-by":"crossref","unstructured":"Hsu, C.T., Wu, J.L.: Hidden Signatures in Image. In: Proc. of ICIP 1996, vol.\u00a03, pp. 223\u2013226 (1996)","DOI":"10.1109\/ICIP.1996.560424"},{"key":"79_CR3","volume-title":"Digital Signatures","author":"M. Atreya","year":"2002","unstructured":"Atreya, M.: Digital Signatures. McGraw-Hill Pub., New York (2002)"},{"key":"79_CR4","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Image Watermarking for Tamper Detection. In: Proc. ICIP 1998, Chicago (October 1998)","DOI":"10.1109\/ICIP.1998.723401"},{"issue":"10","key":"79_CR5","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1109\/83.951542","volume":"10","author":"C.S. Lu","year":"2001","unstructured":"Lu, C.S., Liao, H.-Y.M.: Multipurpose Watermarking for Image Authentication and Protetion. IEEE Transactions on Image Processing\u00a010(10), 1579\u20131592 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"79_CR6","unstructured":"Lin, C.-Y.: Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection. Columbia University (2000)"},{"key":"79_CR7","doi-asserted-by":"crossref","unstructured":"Pitas, I.: A Method for Signature Casting on Digital Images. In: IEEE International Conference on Image Processing, vol.\u00a03, pp. 215\u2013218 (1996)","DOI":"10.1109\/ICIP.1996.560422"},{"key":"79_CR8","doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A.P., Anderson, R.J.: Attacks on Copyright Marking Systems. In: Second Workshop on Information Hidding, Portland, Oregon, USA, April 1998, pp. 218\u2013238 (1998)","DOI":"10.1007\/3-540-49380-8_16"},{"key":"79_CR9","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"S. Katzenbeisser","year":"1999","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (1999)"},{"issue":"7","key":"79_CR10","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kunder","year":"1999","unstructured":"Kunder, D., Hatziakos, D.: Digital Watermarking for Telltale Tamper-proofing and Authentication. Proceedings of the IEEE\u00a087(7), 1167\u20131180 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"79_CR11","unstructured":"A Digital Anti-Forging Method, US Patent 10\/496, 926 (30\/11\/2001)"},{"key":"79_CR12","doi-asserted-by":"crossref","unstructured":"Rughooputh, H.C.S., Bangaleea, R.: Effect of Channel Coding on the Performance of Spatial Watermarking for Copyright Protection. In: 6th IEEE AFRICON, October 2-4, vol.\u00a01, pp. 149\u2013153 (2002)","DOI":"10.1109\/AFRCON.2002.1146824"},{"key":"79_CR13","doi-asserted-by":"crossref","unstructured":"Zhu, H., Clarke, W.A., Ferreira, H.C.: Watermarking for JPEG Image Using Error Correction Coding. In: 2004 7th AFRICON Conference in Africa AFRICON, September 15-17, vol.\u00a01, pp. 191\u2013196 (2004)","DOI":"10.1109\/AFRICON.2004.1406657"},{"key":"79_CR14","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorthms, and Source Code in C (cloth), 2nd edn."},{"key":"79_CR15","doi-asserted-by":"crossref","unstructured":"http:\/\/www.cnw.com.cn\/issues\/2000\/35\/3510.asp","DOI":"10.6012\/jwei.2000.35"},{"key":"79_CR16","unstructured":"http:\/\/hz.axu.cn"},{"key":"79_CR17","unstructured":"http:\/\/www.assuredigit.com\/"},{"key":"79_CR18","unstructured":"http:\/\/news.xinhuanet.com\/newscenter\/2004-08\/28\/content_1908927.htm"}],"container-title":["Lecture Notes in Computer Science","Advances in Intelligent Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11538356_79.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T15:50:55Z","timestamp":1736005855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11538356_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282273","9783540319078"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11538356_79","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}