{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T23:10:14Z","timestamp":1736377814863,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_44","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:27:59Z","timestamp":1147357679000},"page":"406-415","source":"Crossref","is-referenced-by-count":7,"title":["A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques"],"prefix":"10.1007","author":[{"given":"Hsien-Chu","family":"Wu","sequence":"first","affiliation":[]},{"given":"Chuan-Po","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Chwei-Shyong","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TMM.2003.811621","volume":"5","author":"C.S. Lu","year":"2003","unstructured":"Lu, C.S., Liao, H.Y.M.: Structural digital signature for image authentication an incidental distortion resistant scheme. IEEE Transactions on Multimedia\u00a05, 161\u2013173 (2003)","journal-title":"IEEE Transactions on Multimedia"},{"key":"44_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/30.826378","volume":"46","author":"D.C. Lou","year":"2000","unstructured":"Lou, D.C., Liu, J.L.: Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics\u00a046, 31\u201339 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"44_CR3","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"P. Wong","year":"2001","unstructured":"Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing\u00a010, 1593\u20131601 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Sun, R., Sun, H., Yao, T.: A SVD and quantization based semi-fragile watermarking technique for image authentication. In: 2002 6th International Conference on Signal Processing, August 2002, vol.\u00a02, pp. 1592\u20131595 (2002)","DOI":"10.1109\/ICOSP.2002.1180102"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1049\/el:20030041","volume":"39","author":"Z.M. Lu","year":"2003","unstructured":"Lu, Z.M., Liu, C.H., Xu, D.G., Sun, S.H.: Semi-fragile image watermarking method based on index constrained vector quantization. Electronics Letters\u00a039, 35\u201336 (2003)","journal-title":"Electronics Letters"},{"key":"44_CR6","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1049\/ip-vis:20040812","volume":"151","author":"C.T. Li","year":"2004","unstructured":"Li, C.T.: Digital fragile watermarking scheme for authentication of JPEG images. IEE Proc.-Vis. Image Signal Process\u00a0151, 460\u2013466 (2004)","journal-title":"IEE Proc.-Vis. Image Signal Process"},{"issue":"3-4","key":"44_CR7","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM System Journal\u00a035(3-4), 313\u2013337 (1996)","journal-title":"IBM System Journal"},{"key":"44_CR8","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1016\/S0031-3203(04)00189-X","volume":"37","author":"Y.T. Wu","year":"2004","unstructured":"Wu, Y.T., Shih, F.Y.: An adjusted-purpose digital watermarking technique. Pattern Recognition\u00a037, 2349\u20132359 (2004)","journal-title":"Pattern Recognition"},{"key":"44_CR9","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TCSVT.2004.836745","volume":"15","author":"P. Bao","year":"2005","unstructured":"Bao, P., Ma, X.: Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Transactions on Circuits and Systems for Video Technology\u00a015, 96\u2013102 (2005)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"44_CR10","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","volume":"26","author":"C.C. Chang","year":"2005","unstructured":"Chang, C.C., Tsai, P., Lin, C.C.: SVD-based digital image watermarking scheme. Pattern Recognition Letters\u00a026, 1577\u20131586 (2005)","journal-title":"Pattern Recognition Letters"},{"key":"44_CR11","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1016\/j.patrec.2004.07.003","volume":"25","author":"F.J. Huang","year":"2004","unstructured":"Huang, F.J., Guan, Z.H.: A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recognition Letters\u00a025, 1769\u20131775 (2004)","journal-title":"Pattern Recognition Letters"},{"key":"44_CR12","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1049\/el:20030553","volume":"39","author":"J. JeHwang","year":"2003","unstructured":"JeHwang, J.: Digital image watermarking employing codebook in vector quantization. Electronics Letters\u00a039, 840\u2013841 (2003)","journal-title":"Electronics Letters"},{"key":"44_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y. Linde","year":"1980","unstructured":"Linde, Y., Buzo, A., Gray, R.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications\u00a028, 84\u201395 (1980)","journal-title":". IEEE Transactions on Communications"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T22:34:09Z","timestamp":1736375649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11751595_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}