{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:29:14Z","timestamp":1725550154950},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540287681"},{"type":"electronic","value":"9783540320524"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11551492_32","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:39:37Z","timestamp":1127831977000},"page":"418-431","source":"Crossref","is-referenced-by-count":13,"title":["Evaluation of Feature Extraction Techniques for Robust Watermarking"],"prefix":"10.1007","author":[{"given":"Hae-Yeoun","family":"Lee","sequence":"first","affiliation":[]},{"given":"In Koo","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Heung-Kyu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Young-Ho","family":"Suh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Kutter, M.: Watermarking resisting to translation, rotation and scaling. In: Proc. of SPIE, vol.\u00a03528, pp. 423\u2013431 (1998)","DOI":"10.1117\/12.337432"},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/83.846253","volume":"9","author":"S. Pereira","year":"2000","unstructured":"Pereira, S., Pun, T.: Robust template matching for affine resistant image watermark. IEEE Trans. on Image Processing\u00a09, 1123\u20131129 (2000)","journal-title":"IEEE Trans. on Image Processing"},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"J.J.K.O. Ruanaidh","year":"1998","unstructured":"Ruanaidh, J.J.K.O., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing\u00a066, 303\u2013317 (1998)","journal-title":"Signal Processing"},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C. Lin","year":"2001","unstructured":"Lin, C., Cox, I.J.: Rotation, scale and translation resilient watermarking for images. IEEE Trans. on Image Processing\u00a010, 767\u2013782 (2001)","journal-title":"IEEE Trans. on Image Processing"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TCSVT.2003.815947","volume":"13","author":"D. Simitopoulos","year":"2003","unstructured":"Simitopoulos, D., Koutsonanos, D.E., Strintzis, M.G.: Robust image watermarking based on generalized radon transformation. IEEE Trans. on Circuits and Systems for Video Technology\u00a013, 732\u2013745 (2003)","journal-title":"IEEE Trans. on Circuits and Systems for Video Technology"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TIP.2004.823831","volume":"13","author":"M. Arghoniemy","year":"2004","unstructured":"Arghoniemy, M., Twefik, A.H.: Geometric invariance in image watermarking. IEEE Trans. on Image Processing\u00a013, 145\u2013153 (2004)","journal-title":"IEEE Trans. on Image Processing"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Kutter, M., Bhattacharjee, S.K., Ebrahimi, T.: Towards second generation watermarking schemes. Proc. of ICIP, vol. 1, pp. 320\u2013323 (1999)","DOI":"10.1109\/ICIP.1999.821622"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/TIP.2002.801587","volume":"11","author":"P. Bas","year":"2002","unstructured":"Bas, P., Chassery, J.-M., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. on Image Processing\u00a011, 1014\u20131028 (2002)","journal-title":"IEEE Trans. on Image Processing"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.1109\/83.967400","volume":"10","author":"A. Nikolaidis","year":"2001","unstructured":"Nikolaidis, A., Pitas, I.: Region-based image watermarking. IEEE Trans. on Image Processing\u00a010, 1726\u20131740 (2001)","journal-title":"IEEE Trans. on Image Processing"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1109\/TSP.2003.809367","volume":"51","author":"C.W. Tang","year":"2003","unstructured":"Tang, C.W., Hang, H.-M.: A feature-based robust digital image watermarking scheme. IEEE Trans. on Signal Processing\u00a051, 950\u2013959 (2003)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1016\/0031-3203(95)00115-8","volume":"4","author":"B.S. Manjunath","year":"1996","unstructured":"Manjunath, B.S., Shekhar, C., Chellappa, R.: A new approach to image feature detection with applications. Pattern Recognition\u00a04, 627\u2013640 (1996)","journal-title":"Pattern Recognition"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D.G. Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision\u00a060, 91\u2013110 (2004)","journal-title":"International Journal of Computer Vision"},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/B:VISI.0000027790.02288.f2","volume":"60","author":"K. Mikolajczyk","year":"2004","unstructured":"Mikolajczyk, K., Schmid, C.: Scale and affine invariant interest point detectors. International Journal of Computer Vision\u00a060, 63\u201386 (2004)","journal-title":"International Journal of Computer Vision"},{"key":"32_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1023\/B:VISI.0000020671.28016.e8","volume":"59","author":"T. Tuytelaars","year":"2004","unstructured":"Tuytelaars, T., Gool, L.V.: Matching widely separated views based on affine invariant regions. International Journal of Computer Vision\u00a059, 61\u201385 (2004)","journal-title":"International Journal of Computer Vision"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11551492_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:01:00Z","timestamp":1619506860000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11551492_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540287681","9783540320524"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11551492_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}