{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:55:41Z","timestamp":1725551741965},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540298502"},{"type":"electronic","value":"9783540322429"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11578079_79","type":"book-chapter","created":{"date-parts":[[2005,10,21]],"date-time":"2005-10-21T10:51:54Z","timestamp":1129891914000},"page":"762-769","source":"Crossref","is-referenced-by-count":0,"title":["Maximum Correlation Search Based Watermarking Scheme Resilient to RST"],"prefix":"10.1007","author":[{"given":"Sergio","family":"Bravo","sequence":"first","affiliation":[]},{"given":"Felix","family":"Calder\u00f3n","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"79_CR1","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1145\/146370.146374","volume":"24","author":"L.G. Brown","year":"1992","unstructured":"Brown, L.G.: A survey of image registration techniques. ACM Computing Surveys\u00a024, 325\u2013376 (1992)","journal-title":"ACM Computing Surveys"},{"key":"79_CR2","doi-asserted-by":"crossref","unstructured":"Fleet, D.J., Heeger, D.J.: Embedding invisible information in color images. In: IEEE Signal Processing Society 1997 International Conference on Image Processing (ICIP 1997), Santa Barbara, CA (1997)","DOI":"10.1109\/ICIP.1997.647967"},{"key":"79_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/S0031-3203(99)00106-5","volume":"33","author":"S. Pereira","year":"2000","unstructured":"Pereira, S., Pun, T.: An iterative template matching algorithm using the chirp-z transform for digital image watermarking. Pattern Recognition\u00a033, 173\u2013175 (2000)","journal-title":"Pattern Recognition"},{"key":"79_CR4","unstructured":"Kutter, M., Hartung, F.: 5. Computer Security Series. In: Introduction to Watermarking Techniques, 1st edn., pp. 97\u2013120. Artech House (2000)"},{"key":"79_CR5","doi-asserted-by":"crossref","unstructured":"Deguillaume, F., Voloshynovskiy, S., Pun, T.: A method for the estimation and recovering of general affine transform. US Patent Application (2002)","DOI":"10.1117\/12.465289"},{"key":"79_CR6","unstructured":"Craver, S., Periig, A., Petitcolas, F.A.P.: 7. Computer Security Series. In: Robustness of copyright marking systems, 1st edn., pp. 149\u2013174. Artech House (2000)"},{"key":"79_CR7","unstructured":"Herrigel, A., Voloshynovskiy, S., Rytsar, Y.: The watermark template attack (2001)"},{"key":"79_CR8","doi-asserted-by":"crossref","unstructured":"O\u2019 Ruanaidh, J.J.K., Pun, T.: Rotation, scale and translation invariant digital image watermarking. In: Proceedings of ICIP 1997, IEEE International Conference on Image Processing, Santa Barbara, CA, pp. 536\u2013539 (1997)","DOI":"10.1109\/ICIP.1997.647968"},{"key":"79_CR9","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C.Y. Lin","year":"2001","unstructured":"Lin, C.Y., Wu, M., Bloom, J.A., Cox, I.J., Miller, M.L., Lui, Y.M.: Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on Image Processing\u00a010, 767\u2013782 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"79_CR10","doi-asserted-by":"crossref","unstructured":"Dong, P., Galatsanos, N.P.: Affine transformation resistant watermarking based on image normalization. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2002), Rochester, NY, USA (2002)","DOI":"10.1109\/ICIP.2002.1039014"},{"key":"79_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/3-540-36617-2_16","volume-title":"Digital Watermarking","author":"Y. Feng","year":"2003","unstructured":"Feng, Y., Izquierdo, E.: Robust local watermarking on salient image areas. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol.\u00a02613, pp. 180\u2013201. Springer, Heidelberg (2003)"},{"key":"79_CR12","first-page":"950","volume":"51","author":"C.W. Tang","year":"2003","unstructured":"Tang, C.W., Hang, H.M.: A feature-based robust digital image watermarking scheme. Signal Processing\u00a051, 950\u2013959 (2003)","journal-title":"Signal Processing"},{"key":"79_CR13","volume-title":"Advanced Digital Signal Processing: Theory and Applications","author":"G. Zelniker","year":"1993","unstructured":"Zelniker, G., Taylor, F.J.: Advanced Digital Signal Processing: Theory and Applications. Marcel Dekker, Inc., New York (1993)"},{"key":"79_CR14","doi-asserted-by":"crossref","unstructured":"Depovere, G., Kalker, T., Linnartz, J.P.M.G.: Improved watermark detection reliability using filtering before correlation. In: ICIP, vol.\u00a0(1), pp. 430\u2013434 (1998)","DOI":"10.1109\/ICIP.1998.723517"},{"key":"79_CR15","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing\u00a06, 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"key":"79_CR16","volume-title":"Practical genetic algorithms","author":"R.L. Haupt","year":"1998","unstructured":"Haupt, R.L., Haupt, S.E.: Practical genetic algorithms. John Wiley & Sons, Inc., New York (1998)"},{"key":"79_CR17","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking, 1st edn. Morgan Kaufman, San Francisco (2002)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11578079_79.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:59:54Z","timestamp":1605643194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11578079_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540298502","9783540322429"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11578079_79","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}