{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:40Z","timestamp":1725489940831},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_37","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T07:42:01Z","timestamp":1187163721000},"page":"348-355","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Wavelet-Based Blind Watermarking Technique for Real-Time Watermark Interpretation"],"prefix":"10.1007","author":[{"given":"Kil-Sang","family":"Yoo","sequence":"first","affiliation":[]},{"given":"Won-Hyung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"issue":"1","key":"37_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"C.-T. Hsu","year":"1999","unstructured":"Chiou-Ting Hsu, Ja-Ling Wu: Hidden digital watermarks in images, Image Processing, IEEE Transactions on, Vol. 8, Issue: 1, Jan. (1999) 58\u201368","journal-title":"Image Processing, IEEE Transactions on"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Siegmund Brandt: Data Analysis: Third edition, statistical and computational methods for scientists and engineers, Springer-Verlag, (1999) 49\u201353","DOI":"10.1007\/978-1-4612-1446-5"},{"issue":"5","key":"37_CR3","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1109\/41.954550","volume":"8","author":"H. Ming-Shing","year":"2001","unstructured":"Ming-Shing Hsieh, Din-Chang Tseng, Yong-Huai Huang: Hiding Digital Watermarks Using Multiresolution Wavelet Transform, IEEE Transactions on Industrial electronis, Vol 8,No 5, October(2001) 875\u2013882","journal-title":"IEEE Transactions on Industrial electronis"},{"key":"37_CR4","unstructured":"S.K. Park and K.W. Miller: Random Number Generators: Good Ones Are Hard To Find, Communications of the ACM, October (1988) 1192\u20131201"},{"issue":"12","key":"37_CR5","first-page":"1673","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J.; Kilian, J. Leighton, F.T., Shamoon,: Secure spread spectrum watermarking for multimedia Image Processing, IEEE Transactions on, Vol. 6 Issue. 12, Dec. (1997) 1673\u20131687","journal-title":"IEEE Transactions on"},{"key":"37_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Attacks on copyright marking systems, information hiding: 2nd int\u2019l workshop","author":"F. A. P. Petitcolas","year":"1998","unstructured":"F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn.: Attacks on copyright marking systems, information hiding: 2nd int\u2019l workshop, vol. 1525 of Lecture notes in computer science, Springer, April (1998) 218\u2013238"},{"key":"37_CR7","unstructured":"Stefan Katzenbeisser and Fabien A. P. Peticolas: Information Hiding Techniques for Steganography and Digital Watermarking, ARTECH HOUSE INC, (2000) 111\u2013112"},{"key":"37_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"G.C. Langelaar","year":"2000","unstructured":"Langelaar, G.C.; Setyawan, I.; Lagendijk, R.L.: Watermarking digital image and video data. A state-of-the-art overview, IEEE Signal Processing Magazine, Vol. 17, Issue:5, Sept.(2000) 20\u201346","journal-title":"A state-of-the-art overview, IEEE Signal Processing Magazine"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T00:41:59Z","timestamp":1558485719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_37","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"18 June 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}