{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:07:05Z","timestamp":1761764825914,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_10","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"172-189","source":"Crossref","is-referenced-by-count":2,"title":["Personal Rights Management \u2013 Taming Camera-Phones for Individual Privacy Enforcement"],"prefix":"10.1007","author":[{"given":"Mina","family":"Deng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lothar","family":"Fritsch","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Klaus","family":"Kursawe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"unstructured":"Open Digital Rights Language (ODRL), http:\/\/www.odrl.net","key":"10_CR1"},{"unstructured":"XrML is being contributed to the standards body OASIS Rights Language Technical Committee as its foundation technology, http:\/\/www.xrml.org","key":"10_CR2"},{"issue":"11\/1995","key":"10_CR3","first-page":"0031","volume":"281","author":"Directive 95\/46\/ec of the european parliament and the council of 24 october 1995","year":"1995","unstructured":"Directive 95\/46\/ec of the european parliament and the council of 24 october 1995. Official Journal L 281, 23\/11\/1995, 0031\u20130050 (1995)","journal-title":"Official Journal L"},{"doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Digital Rights Management Workshop, pp. 111\u2013119 (2003)","key":"10_CR4","DOI":"10.1145\/947380.947395"},{"doi-asserted-by":"crossref","unstructured":"Agi, L., Cong, L.: An empirical study of secure mpeg video transmissions. In: Proc. of the Internet society symposium on network and distributed system security, San Diego, CA (February 1996)","key":"10_CR5","DOI":"10.1109\/NDSS.1996.492420"},{"unstructured":"Open Mobile Alliance. OMA digital rights management version 1.0. OMA, http:\/\/www.openmobilealliance.org\/documents.html","key":"10_CR6"},{"unstructured":"Blau, J.: Cracks appear in Bluetooth security. NetworkWorld.com (February 2004), http:\/\/www.networkworld.com\/news\/2004\/0211cracksappear.html","key":"10_CR7"},{"unstructured":"Cardin, P.: Robust signal representation for image identification and hashing. Student Literature survey (2005)","key":"10_CR8"},{"unstructured":"CNN. Teacher\u2019s Bush remarks investigated - Some students protest teacher being put on leave (March 2006), http:\/\/www.cnn.com\/2006\/EDUCATION\/03\/03\/teacher.bush.ap\/?section=cnn_topstories","key":"10_CR9"},{"unstructured":"Deitz, L.: Privacy and security \u2013 ecs privacy directive: protecting personal data and ensuring its free movement. Computers and Security Journal, 25\u201346","key":"10_CR10"},{"unstructured":"Dix, A.: Das Recht am eigenen Bild \u2013 Anachronismus im Zeitalter des Internet? In: Mediale (Selbst-)Darstellung und Datenschutz, Konferenz des LfD NRW (2000)","key":"10_CR11"},{"unstructured":"Anderson, R.J., Petitcolas, F.A.P., Kuhn, M.G.: Information hiding-a survey. 87, 1062\u20131078 (1999)","key":"10_CR12"},{"unstructured":"Fridrich, J., Goljan, M.: Robust hash functions for digital watermarkin (March 2000)","key":"10_CR13"},{"doi-asserted-by":"crossref","unstructured":"Hartung, F., Kutter, M.: Multimedia watermarking techniques. In: Proceedings of the IEEE, special issue on protecting of multimedia contents, vol.\u00a087, pp. 1079\u20131107 (July 1999)","key":"10_CR14","DOI":"10.1109\/5.771066"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/35.883493","volume":"38","author":"F. Hartung","year":"2000","unstructured":"Hartung, F., Ramme, F.: Digital rights management and watermarking for multimedia content for m-commerce. IEEE communications magazine\u00a038, 78\u201384 (2000)","journal-title":"IEEE communications magazine"},{"doi-asserted-by":"crossref","unstructured":"Johnson, M., Ramchandran, K.: Dither-based secure image hashing using distributed coding. In: ICIP (2), pp. 751\u2013754 (2003)","key":"10_CR16","DOI":"10.1109\/ICIP.2003.1246789"},{"doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for steganography and digital watermarking. Artech House, INC. (2000)","key":"10_CR17","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-44993-5_8","volume-title":"Digital Rights Management","author":"L. Korba","year":"2003","unstructured":"Korba, L., Kenny, S.: Towards meeting the privacy challenge: Adapting drm. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 118\u2013136. Springer, Heidelberg (2003)"},{"key":"10_CR19","volume-title":"Proc. Of IEEE international conference on image processing ICIP","author":"S. Kozat","year":"2004","unstructured":"Kozat, S., Mih\u00e7ak, M.K., Venkatesan, R.: Robust perceptual hashing via matrix invariance. In: Proc. Of IEEE international conference on image processing ICIP, Singapore, September 2004, Springer, Heidelberg (2004)"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-540-30144-8_33","volume-title":"Information Security","author":"W. Ku","year":"2004","unstructured":"Ku, W., Chi, C.: Survey on the technological aspects of digital rights management. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 391\u2013403. Springer, Heidelberg (2004)"},{"issue":"6","key":"10_CR21","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/JPROC.2004.827361","volume":"92","author":"B.M. Macq","year":"2004","unstructured":"Macq, B.M., Dittmann, J., Delp, E.J.: Benchmarking of image watermarking algorithms for digital rights management. Proceedings of the IEEE\u00a092(6), 971\u2013984 (2004)","journal-title":"Proceedings of the IEEE"},{"unstructured":"MarcSpider. Digimarc image tracking service. DigiMarc corporation, (2001), http:\/\/www.digimarc.com\/products\/imagebridge\/MarcSpider\/default.asp","key":"10_CR22"},{"doi-asserted-by":"crossref","unstructured":"McCarthy, E.P., Balado, F., Silverstre, G.C.M., Hurley, N.J.: A framework for soft hashing and its application to robust image hashing. In: IS&T\/SPIE (ed.) Proc. of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA, January 2005, vol.\u00a05681, pp. 5681\u201306 (2005)","key":"10_CR23","DOI":"10.1117\/12.587592"},{"key":"10_CR24","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-47870-1_2","volume-title":"ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management","author":"M.K. Mih\u00e7ak","year":"2002","unstructured":"Mih\u00e7ak, M.K., Venkatesan, R.: New iterative geometric methods for robust perceptual image hashing. In: ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, London, UK, pp. 13\u201321. Springer, Heidelberg (2002)"},{"unstructured":"Mikolajczyk, K., Schmid, C.: A performance evaluation of local descriptors. In: PAMI (Submitted, 2004)","key":"10_CR25"},{"doi-asserted-by":"crossref","unstructured":"Monga, V., Evans, B.L.: Robust perceptual image hashing using feature points. In: Proc. IEEE Int. Conf. on Image Processing, Singapore (October 2004)","key":"10_CR26","DOI":"10.1109\/ICIP.2004.1418845"},{"doi-asserted-by":"crossref","unstructured":"Monga, V., Vats, D., Evans, B.L.: Image authentication under geometric attacks via structure matching. In: Proc. IEEE Int. Conf. on Multimedia & Expo, London, UK, July 2005, Amsterdam, The Netherlands (2005)","key":"10_CR27","DOI":"10.1109\/ICME.2005.1521402"},{"key":"10_CR28","first-page":"340","volume-title":"IHW 2001: Proceedings of the 4th International Workshop on Information Hiding","author":"S. Pereira","year":"2001","unstructured":"Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: IHW 2001: Proceedings of the 4th International Workshop on Information Hiding, pp. 340\u2013353. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A., Steinebach, M., Raynal, F., Dittmann, J., Fontaine, C., Fates, N.: Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In: SPIE International Symposium on Electronic Imaging 2001. Proceedings of the SPIE, vol.??4314, pp. 575???584. SPIE (2001);","key":"#cr-split#-10_CR29.1","DOI":"10.1117\/12.435442"},{"unstructured":"Security and Watermarking of Multimedia Contents III","key":"#cr-split#-10_CR29.2"},{"key":"10_CR30","first-page":"40","volume-title":"special issues on identification and protection of multimedia information","author":"C.I. Podilchuk","year":"1998","unstructured":"Podilchuk, C.I., Wolfgang, R.B., Delp, E.J.: Perceptual watermarks for digital images and video. In: special issues on identification and protection of multimedia information, pp. 40\u201351. IEEE, Los Alamitos (1998)"},{"unstructured":"Raymond, E.: HP Developing Picture Jamming Technology to Block Unwanted Photographs, http:\/\/www.digitalcamerainfo.com\/d\/News.htm","key":"10_CR31"},{"unstructured":"Rosenblatt, B.: Steganography revisited: watermarking comes in from the cold.\u00a03(5) (June 2003)","key":"10_CR32"},{"unstructured":"Sensaura. UK companies team to solve worldwide camera phone privacy abuse. British Safe Haven technology enables digital cameras to be disabled in a localized environment. Sensaura press release (September 2003), http:\/\/www.sensaura.com\/news\/pr.php?article=2003_09_11.inc","key":"10_CR33"},{"doi-asserted-by":"crossref","unstructured":"Skrepth, C.J., Uhl, A.: Robust hash functions for visual data: An experimental comparison. In: Iberian Conference on Pattern Recognition and Image Analysis, pp. 986\u2013993 (2003)","key":"10_CR34","DOI":"10.1007\/978-3-540-44871-6_114"},{"key":"10_CR35","first-page":"7","volume-title":"Int. Conf. on Image Processing (ICIP 2001)","author":"V. Solachidis","year":"2001","unstructured":"Solachidis, V., Tefas, A., Nikolaidis, N., Tsekeridou, S., Nikolaidis, A., Pitas, I.: A benchmarking protocol for watermarking methods. In: Int. Conf. on Image Processing (ICIP 2001), vol.\u00a021, pp. 7\u201310. IEEE, Los Alamitos (2001)"},{"key":"10_CR36","volume-title":"First International Symposium on Control, Communications and Signal Processing","author":"M. Trimeche","year":"2004","unstructured":"Trimeche, M., Chebil, F.: Digital rights management for visual content in mobile applications. In: First International Symposium on Control, Communications and Signal Processing, IEEE, Los Alamitos (2004)"},{"key":"10_CR37","first-page":"15","volume-title":"Signal Processing magazine","author":"M. Wu","year":"2004","unstructured":"Wu, M., Trappe, W., Wang, Z., Liu, K.J.R.: Collision resistant fingerprinting for multimedia. In: Signal Processing magazine, vol.\u00a021, pp. 15\u201327. IEEE, Los Alamitos (2004)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T08:50:22Z","timestamp":1736671822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/11957454_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}