{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:40:03Z","timestamp":1737398403534,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_1","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"1-14","source":"Crossref","is-referenced-by-count":1,"title":["A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients"],"prefix":"10.1007","author":[{"given":"Minoru","family":"Kuribayashi","sequence":"first","affiliation":[]},{"given":"Hatsukazu","family":"Tanaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1109\/30.809196","volume":"45","author":"I. Echizen","year":"1999","unstructured":"I. Echizen, H. Yoshiura, T. Arai, H. Kimura and T. Takeuchi, \u201cGeneral quality maintenance module for motion picture watermarking\u201d IEEE Transaction on Consumer Electronics, Vol.45, No.4, pp.1150\u20131158, (Nov, 1999).","journal-title":"IEEE Transaction on Consumer Electronics"},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/30.826385","volume":"46","author":"C. F. Wu","year":"2000","unstructured":"C. F. Wu and W. S. Hsieh, \u201cDigital watermarking using zerotree of DCT\u201d IEEE Transaction on Consumer Electronics, Vol.46, No,1, pp.87\u201394, (Feb, 2000).","journal-title":"IEEE Transaction on Consumer Electronics"},{"key":"1_CR3","unstructured":"T. Mori and H. Imai, \u201cThe distribution of DCT coeffcients to embed digital wa-termarks\u201d SCIS98-3.2.E, (Jan, 1998)."},{"key":"1_CR4","unstructured":"S. Lee and H. Imai, \u201cA new method of selecting blocks for the digital watermark using DCT\u201d SCIS98-3.2.D, (Jan, 1998)."},{"key":"1_CR5","unstructured":"N. Nakanishi and H. Tanaka, \u201cWatermark of images having tolerance for clipping attack\u201d SITA99, pp.613\u2013616(Dec, 1999)."},{"key":"1_CR6","unstructured":"M. Iwata and A. Shiozaki, \u201cIndex data embedding method for color images utilizing features of wavelet transform\u201d SITA99, pp.181\u2013184 (Dec, 1999)."},{"key":"1_CR7","unstructured":"H. Ishizuka, Y. Sakai and K. Sakurai, \u201cA new digital watermarking method based on visual illusions\u201d SITA97, pp.65\u201368, (Dec, 1997)."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Fabien A. P. Petitcolas and Ross J. Anderson, \u201cEvaluation of copyright marking systems\u201d Proc. IEEE Multimedia Systems\u201999, Vol.1, pp.574\u2013579, (Jun, 1999).","DOI":"10.1109\/MMCS.1999.779264"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"I. J. Cox, J. Kilian, F. T. Leigthton and T. Shamoon, \u201cSecure spread spectrum watermarking for multimedia\u201d Proc. IEEE Transactions on Image Processing, Vol.6, No.12, pp.1673\u20131687, (Dec, 1997).","DOI":"10.1109\/83.650120"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"M. D. Swanson, M. Kobayashi and A. H. Tewlfilk, \u201cMultimedia data-embedding and watermarking technologies,\u201d Proc. IEEE (Special Issue on Multimedia Signal Processing), Vol.86, No.6, pp.1064\u20131087, (Jun, 1998).","DOI":"10.1109\/5.687830"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"F. Hartung and M. Kutter, \u201cMultimedia watermarking techniques\u201dd Proc. IEEE, Vol.87, No.7, pp.1079\u20131107, (Jul, 1999).","DOI":"10.1109\/5.771066"},{"key":"1_CR12","unstructured":"J. Tanimoto and A. Shiozaki, \u201cA digital image watermarking scheme withstanding StirMark attack\u201d SCIS99, pp.217\u2013222, (Jan, 1999)."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:07:35Z","timestamp":1737396455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}