{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T17:40:24Z","timestamp":1736617224279,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540487661"},{"type":"electronic","value":"9783540487692"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11922162_7","type":"book-chapter","created":{"date-parts":[[2006,10,24]],"date-time":"2006-10-24T17:42:11Z","timestamp":1161711731000},"page":"56-63","source":"Crossref","is-referenced-by-count":3,"title":["Image Desynchronization for Secure Collusion-Resilient Fingerprint in Compression Domain"],"prefix":"10.1007","author":[{"given":"Zhongxuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Shiguo","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSP.2004.1276103","volume":"21","author":"M. Wu","year":"2004","unstructured":"Wu, M., Trappe, W., Wang, Z.J., Liu, R.: Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine\u00a021(2), 15\u201327 (2004)","journal-title":"IEEE Signal Processing Magazine"},{"issue":"6","key":"7_CR2","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TIP.2005.847284","volume":"14","author":"Z.J. Wang","year":"2005","unstructured":"Wang, Z.J., Wu, M., Zhao, H.V., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Processing.\u00a014(6), 804\u2013821 (2005)","journal-title":"IEEE Trans. Image Processing."},{"issue":"5","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TIFS.2006.873596","volume":"1","author":"H.G. Schaathun","year":"2006","unstructured":"Schaathun, H.G.: The Boneh-Shaw fingerprinting scheme is better than we thought. IEEE Trans. Information Forensics and Security\u00a01(2), 248\u2013255 (2006)","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"7_CR5","unstructured":"Wu, Y.D.: Linear combination collusion attack and its application on an anti-collusion fingerprinting. In: IEEE ICASSP 2005, Philadelphia, USA, vol.\u00a0II, pp. 13\u201316 (2005)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Mao, Y.N., Mihcak, K.: Collusion-resistant intentional de-synchronization for digital video fingerprinting. In: IEEE ICIP 2005, vol.\u00a01, pp. 237\u2013240 (2005)","DOI":"10.1109\/ICIP.2005.1529731"},{"issue":"10","key":"7_CR7","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/LSP.2004.835475","volume":"11","author":"M.U. Celik","year":"2004","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M.: Collusion-resilient fingerprinting by random pre-warping. IEEE Signal Processing Letters\u00a011(10), 831\u2013835 (2004)","journal-title":"IEEE Signal Processing Letters"},{"key":"7_CR8","unstructured":"Chang, S.F.: Compressed-domain techniques for image\/video indexing and manipulation. In: IEEE ICIP 1995, vol.\u00a01, pp. 23\u201326 (1995)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Smith, B.C., Rowe, L.A.: Fast software processing of motion JPEG video. ACM Multimedia, 77\u201388 (1994)","DOI":"10.1145\/192593.192628"},{"issue":"2","key":"7_CR10","first-page":"027001\/1","volume":"45","author":"J.S. Lee","year":"2006","unstructured":"Lee, J.S., Tsai, C.T., Ko, C.H.: Image watermarking through attack simulation. Optical Engineering\u00a045(2) (2006) 027001\/1-11","journal-title":"Optical Engineering"},{"key":"7_CR11","unstructured":"Setyawan, I., Lagendijk, R.L.: Perceptual quality impact of geometric distortion in images. In: 25-th Symposium on Information Theory in the Benelux, June 2-4, 2004, pp. 217\u2013224 (2004)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Setyawan, I., Lagendijk, R.L.: Human perception of geometric distortions in images. In: SPIE Security, Steganography, and Watermarking of Multimedia Contents 2004, pp. 256\u2013267 (2004)","DOI":"10.1117\/12.526726"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing - PCM 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11922162_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T17:20:47Z","timestamp":1736616047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11922162_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540487661","9783540487692"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11922162_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}