{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:40:58Z","timestamp":1755600058328},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333548"},{"type":"electronic","value":"9783540333555"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734727_30","type":"book-chapter","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T11:57:27Z","timestamp":1152532647000},"page":"378-388","source":"Crossref","is-referenced-by-count":9,"title":["Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme"],"prefix":"10.1007","author":[{"given":"Grace C. -W.","family":"Ting","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-540-24624-4_27","volume-title":"Digital Watermarking","author":"A. Adelsbach","year":"2004","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 355\u2013369. Springer, Heidelberg (2004)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking Schemes Provably Secure Against Copy and Ambiguity Attacks. In: Proceedings of the ACM Workshop on Digital Rights Management (DRM 2003), pp. 111\u2013119 (2003)","DOI":"10.1145\/947380.947395"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Andrews, H.C., Patterson, C.L.: Singular Value Decomposition (SVD) Image Coding. IEEE Transactions on Communications, 425\u2013432 (1976)","DOI":"10.1109\/TCOM.1976.1093309"},{"key":"30_CR4","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"issue":"4","key":"30_CR5","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"S. Craver","year":"1998","unstructured":"Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications. IEEE Journal of Selected Areas in Communication\u00a016(4), 573\u2013586 (1998)","journal-title":"IEEE Journal of Selected Areas in Communication"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies. In: Proceedings of the ACM Multimedia and Security Workshop, pp. 166\u2013174 (2004)","DOI":"10.1145\/1022431.1022461"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Ganic, E., Eskicioglu, A.M.: Robust Embedding Of Visual Watermarks using DWT-SVD. Journal of Electronic Imaging (2005)","DOI":"10.1117\/1.2137650"},{"key":"30_CR8","unstructured":"Ganic, E., Zubair, N., Eskicioglu, A.M.: An Optimal Watermarking Scheme Based on Singular Value Decomposition. In: Proceedings of the IASTED International Conference on Communication, Network, and Information Security (CNIS 2003), pp. 85\u201390. ACTA Press (2003)"},{"key":"30_CR9","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"2002","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice Hall, Englewood Cliffs (2002)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Veith, H.: Securing Symmetric Watermarking Schemes Against Protocol Attacks. In: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 260\u2013268 (2002)","DOI":"10.1117\/12.465283"},{"issue":"1","key":"30_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R. Liu","year":"2002","unstructured":"Liu, R., Tan, T.: An SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia\u00a04(1), 121\u2013128 (2002)","journal-title":"IEEE Transactions on Multimedia"},{"key":"30_CR12","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanston, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"4","key":"30_CR13","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1109\/TMM.2005.846774","volume":"7","author":"Y. Wu","year":"2005","unstructured":"Wu, Y.: On the Security of an SVD-Based Ownership Watermarking. IEEE Transactions on Multimedia\u00a07(4), 624\u2013627 (2005)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3","key":"30_CR14","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TMM.2005.843357","volume":"7","author":"X.-P. Zhang","year":"2005","unstructured":"Zhang, X.-P., Li, K.: Comments on An SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia\u00a07(3), 593\u2013594 (2005)","journal-title":"IEEE Transactions on Multimedia"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734727_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T19:12:18Z","timestamp":1555701138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734727_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333548","9783540333555"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11734727_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}