{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:24:32Z","timestamp":1725560672942},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540300403"},{"type":"electronic","value":"9783540321316"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11582267_33","type":"book-chapter","created":{"date-parts":[[2005,10,18]],"date-time":"2005-10-18T19:00:56Z","timestamp":1129662056000},"page":"371-381","source":"Crossref","is-referenced-by-count":1,"title":["Invertible Watermarking Scheme for Authentication and Integrity"],"prefix":"10.1007","author":[{"given":"Kil-Sang","family":"Yoo","sequence":"first","affiliation":[]},{"given":"Mi-Ae","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Won-Hyung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"33_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. on Image Processing"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Yeung, M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proc. ICIP, Santa Barbara, CA, vol.\u00a02, pp. 680\u2013683 (1997)","DOI":"10.1109\/ICIP.1997.638587"},{"key":"33_CR3","unstructured":"Memon, N., Shende, S., Wong, P.: On the Security of the Yeung-Mintzer Authentication Watermark. In: Proc. Of the IS and TPICS Symposium, Savannah, Georgia (2000)"},{"key":"33_CR4","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"P. Wong","year":"2001","unstructured":"Wong, P., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. on Image Processing\u00a010, 1593\u20131601 (2001)","journal-title":"IEEE Trans. on Image Processing"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-36617-2_14","volume-title":"Digital Watermarking","author":"S. Byun","year":"2003","unstructured":"Byun, S., Lee, S., Tewfik, A., Ahn, B.: A SVD-Based Fragile Watermarking Scheme for Image Authentication. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol.\u00a02613, pp. 170\u2013178. Springer, Heidelberg (2003)"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Rui, D.: Lossless Data Embedding For All Image Formats. SPIE Photonics West, Security and Watermarking of Multimedia Contents, 572\u2013583 (2002)","DOI":"10.1117\/12.465317"},{"key":"33_CR7","first-page":"646","volume":"5","author":"J.M. Barton","year":"1997","unstructured":"Barton, J.M.: Method and apparatus for embedding authentication information within digital data. United States Patent\u00a05, 646\u2013997 (1997)","journal-title":"United States Patent"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proc. of International Conference on Image Processing, vol. II, September 2002, pp. 157\u2013160 (2002)","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du., R.: Lossless data embedding - new paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing, 185\u2013196 (February 2002)","DOI":"10.1155\/S1110865702000537"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Yang, Y., Bao, F.: An Invertible Watermarking Schemes for Authentication of Electronic Clinical Brain Atlas. In: ICASSP (2003)","DOI":"10.1109\/ICASSP.2003.1199529"},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-45496-9_3","volume-title":"Information Hiding","author":"M. Goljan","year":"2001","unstructured":"Goljan, M., Fridrich, J.J., Du, R.: Distortion-Free Data Embedding for Images. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 27\u201341. Springer, Heidelberg (2001)"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message digest algorithm, Tech. Rep. (1992)","DOI":"10.17487\/rfc1321"},{"key":"33_CR13","first-page":"128","volume-title":"Petttcolas: Information hiding techniques for steg-anography and digital watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Fabien, A.P.: Petttcolas: Information hiding techniques for steg-anography and digital watermarking, pp. 128\u2013129. Artech House, Boston (2000)"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing - PCM 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11582267_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:00:51Z","timestamp":1605643251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11582267_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540300403","9783540321316"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11582267_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}