{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T23:10:15Z","timestamp":1736377815952,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344827"},{"type":"electronic","value":"9783540344834"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760191_42","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:00:36Z","timestamp":1147356036000},"page":"285-292","source":"Crossref","is-referenced-by-count":6,"title":["Robust Digital Image Watermarking Algorithm Using BPN Neural Networks"],"prefix":"10.1007","author":[{"given":"Cheng-Ri","family":"Piao","sequence":"first","affiliation":[]},{"given":"Wei-zhong","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Dong-Min","family":"Woo","sequence":"additional","affiliation":[]},{"given":"Seung-Soo","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Hartung, F., Kutter, M.: Mulimedia Watermarking Techniques. Proceedings of the IEEE, 1079\u20131094 (1999)","DOI":"10.1109\/5.771066"},{"key":"42_CR2","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/ICIP.1994.413536","volume":"2","author":"R.G. Schyndel","year":"1994","unstructured":"Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A Digital Watermarking. Int. Conf. on Image Processing\u00a02, 86\u201390 (1994)","journal-title":"Int. Conf. on Image Processing"},{"issue":"3-4","key":"42_CR3","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bendor","year":"1996","unstructured":"Bendor, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal\u00a035(3-4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"42_CR4","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"12","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing\u00a012, 1673\u20131687 (1997)","journal-title":"IEEE Trans. on Image Processing"},{"key":"42_CR5","first-page":"548","volume":"3","author":"X. Xia","year":"1997","unstructured":"Xia, X., Boncelet, C.G., Arce, G.R.: A Multiresolution Watermark for Digital Images. Proc. IEEE ICIP\u00a03, 548\u2013551 (1997)","journal-title":"Proc. IEEE ICIP"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"4","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory\u00a04, 1423\u20131443 (2001)","journal-title":"IEEE Transactions on Information Theory"},{"key":"42_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1007\/3-540-45453-5_134","volume-title":"Advances in Multimedia Information Processing - PCM 2001","author":"Y. Jang","year":"2001","unstructured":"Jang, Y., Kim, I., Kang, H., Kim, K., Han, S.: Blind Watermarking Algorithm Using Complex Block Selection Method. In: Shum, H.-Y., Liao, M., Chang, S.-F. (eds.) PCM 2001. LNCS, vol.\u00a02195, pp. 996\u20131001. Springer, Heidelberg (2001)"},{"key":"42_CR8","first-page":"90","volume":"E83-A","author":"H. Inoue","year":"2000","unstructured":"Inoue, H., Miyazaki, A., Araki, T., Katsura, T.: A Digital Watermark Method Using the Wavelet Transform for Video Data. IEICE Trans. Fundamentals\u00a0E83-A, 90\u201395 (2000)","journal-title":"IEICE Trans. Fundamentals"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Mei, S., Li, R., Dang, H., Wang, Y.: Decision of Image Watermarking Strength Based on Artificial Neural Networks. In: Proceedings of the 9th International Conference on Neural Information Processing, ICONIP 2002, vol.\u00a05, pp. 2430\u20132434 (2002)","DOI":"10.1109\/ICONIP.2002.1201930"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760191_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T22:32:27Z","timestamp":1736375547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760191_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344827","9783540344834"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11760191_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}