{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:08:47Z","timestamp":1743091727411,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427001"},{"type":"electronic","value":"9783540454724"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45472-1_2","type":"book-chapter","created":{"date-parts":[[2007,6,13]],"date-time":"2007-06-13T00:03:20Z","timestamp":1181693000000},"page":"21-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Efficient Watermark Detection and Collusion Security"],"prefix":"10.1007","author":[{"given":"Francis","family":"Zane","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,26]]},"reference":[{"issue":"5","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"D. Boneh and J. Shaw. Collusion secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897\u20131905, 1998.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Crypto\u2019 94, pages 257\u2013270, 1994.","DOI":"10.1007\/3-540-48658-5_25"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"I. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6:1673\u20131687, 1997.","journal-title":"IEEE Transactions on Image Processing"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"F. Ergun, J. Kilian, and R. Kumar. A note on the limits of collusion-resistant watermarks. In Eurocrypt\u2019 99, pages 140\u2013149, 1999.","DOI":"10.1007\/3-540-48910-X_10"},{"issue":"6","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.782097","volume":"45","author":"V. Guruswami","year":"1999","unstructured":"V. Guruswami and M. Sudan. Improved decoding of reed-solomon and algebraic-geometric codes. IEEE Transactions on Information Theory, 45(6):1757\u20131767, September 1999.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane. Resistance of digital fingerprints to collusional attacks. In Proceedings of 1998 IEEE International Symposium on Information Theory, page 271, Cambridge, MA, August 1998. Full version available as Princeton CS TR-585-98.","DOI":"10.1109\/ISIT.1998.708876"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"F.A.P. Petitcolas and R.J. Anderson. Evaluation of copyright marking systems. In IEEE Multimedia Systems (ICMCS\u201999), pages 574\u2013579, 1999.","DOI":"10.1109\/MMCS.1999.779264"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn. Attacks on copyright marking systems. In Second International Workshop on Information Hiding, pages 219\u2013239, 1998.","DOI":"10.1007\/3-540-49380-8_16"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45472-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T06:43:33Z","timestamp":1737096213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45472-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427001","9783540454724"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-45472-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"26 October 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}