{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T05:13:29Z","timestamp":1736226809570,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540305064"},{"type":"electronic","value":"9783540324201"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11590316_69","type":"book-chapter","created":{"date-parts":[[2005,12,6]],"date-time":"2005-12-06T15:18:20Z","timestamp":1133882300000},"page":"447-452","source":"Crossref","is-referenced-by-count":5,"title":["A Hybrid Approach to Digital Image Watermarking Using Singular Value Decomposition and Spread Spectrum"],"prefix":"10.1007","author":[{"given":"Kunal","family":"Bhandari","sequence":"first","affiliation":[]},{"given":"Suman K.","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Jadhav","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","volume-title":"Digital Watermarking","author":"I. Cox","year":"2001","unstructured":"Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kauffman Publisher, San Francisco (2001)"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"George, M., Chouinard, J.Y., Georganas, N.: Digital Watermarking of Images and Video using Direct Sequence Spread Spectrum Techniques. In: IEEE Canadian Conference on Electrical and Computer Engineering, May 9-12, vol.\u00a01, pp. 116\u2013121 (1999)","DOI":"10.1109\/CCECE.1999.807181"},{"issue":"1","key":"69_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R. Liu","year":"2002","unstructured":"Liu, R., Tan, T.: A SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia\u00a04(1), 121\u2013128 (2002)","journal-title":"IEEE Transactions on Multimedia"},{"key":"69_CR4","doi-asserted-by":"crossref","unstructured":"Chandra, D.V.S.: Digital Image Watermarking using SVD. In: Circuits and Systems, MWSCAS-2002, August 4-7, vol.\u00a03, pp. III-264 - III-267 (2002)","DOI":"10.1109\/MWSCAS.2002.1187023"},{"key":"69_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/3-540-45116-1_26","volume-title":"Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security","author":"V.I. Gorodetski","year":"2001","unstructured":"Gorodetski, V.I., Popyack, L.J., Samoilov, V., Skormin, V.A.: SVD-Based Approach to Transparent Embedding Data into Digital Images. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol.\u00a02052, pp. 263\u2013274. Springer, Heidelberg (2001)"},{"key":"69_CR6","doi-asserted-by":"crossref","unstructured":"Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: Malicious attacks and counterattacks. In: Proc. of Security and Watermarking of Multimedia Contents, SPIE, January 1999, vol.\u00a03657, pp. 147\u2013158 (1999)","DOI":"10.1117\/12.344665"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11590316_69.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T08:48:59Z","timestamp":1736153339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11590316_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540305064","9783540324201"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/11590316_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}