{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:01:49Z","timestamp":1725483709160},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_1","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["Trustworthy Paper Documents"],"prefix":"10.1007","author":[{"given":"Marshall","family":"Bern","sequence":"first","affiliation":[]},{"given":"Jeff","family":"Breidenbach","sequence":"additional","affiliation":[]},{"given":"David","family":"Goldberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"1_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Information Hiding: First International Workshop","year":"1996","unstructured":"Ross Anderson, ed. Information Hiding: First International Workshop, LNCS 1174, Springer, 1996."},{"key":"1_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-61996-8_30","volume-title":"Information Hiding: First International Workshop","author":"R. Anderson","year":"1996","unstructured":"Ross Anderson. Stretching the limits of steganography. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 39\u201347."},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1109\/T-C.1974.223826","volume":"23","author":"R. Ascher","year":"1974","unstructured":"R. Ascher and G. Nagy. A means for achieving a high degree of compaction on scan-digitized printed text. IEEE Trans. on Computers 23 (1974), 1174\u20131179.","journal-title":"IEEE Trans. on Computers"},{"key":"1_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Information Hiding: Second International Workshop","year":"1998","unstructured":"David Aucsmith, ed. Information Hiding: Second International Workshop, LNCS 1525, Springer, 1998."},{"key":"1_CR5","first-page":"1278","volume":"3","author":"J. Brassil","year":"1994","unstructured":"J. Brassil, S. Low, N. Maxemchuk, L. O\u2019Gorman. Electronic marking and identification techniques to discourage document copying. Proc. IEEEInfocom\u201994, vol. 3, 1994, 1278\u20131287. Also in IEEEJ. Selected Areas in Communications, vol 13, 1995, 1495\u20131504.","journal-title":"Proc. IEEEInfocom\u201994"},{"key":"1_CR6","unstructured":"J. Brassil, S. Low, N. Maxemchuk, L. O\u2019Gorman. Hiding information in document images. Proc. 1995 Conf. on Information Sciences and Systems, Johns Hopkins, 1995, 482\u2013489."},{"key":"1_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/3-540-61996-8_43","volume-title":"Information Hiding: First International Workshop","author":"J. Brassil","year":"1996","unstructured":"Jack Brassil and Larry O\u2019Gorman. Watermarking document images with bounding box expansion. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 227\u2013235."},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M. H. M. Costa","year":"1983","unstructured":"M. H. M. Costa. Writing on dirty paper. IEEE Trans. Information Theory 29 (1983), 439\u2013441.","journal-title":"IEEE Trans. Information Theory"},{"key":"1_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-61996-8_41","volume-title":"Information Hiding: First International Workshop","author":"I. J. Cox","year":"1996","unstructured":"Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 185\u2013206."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"J. J. Eggers, W. D. Ihlenfeldt, and B. Girod. Digital watermarking of chemical structure sets. Information Hiding: Fourth International Workshop, Ira S. Moskowitz, ed. Springer.","DOI":"10.1007\/3-540-45496-9_15"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1117\/12.175304","volume":"2171","author":"D. Hecht","year":"1994","unstructured":"David Hecht. Embedded data glyph technology for hardcopy digital documents. SPIE Proceedings, Vol. 2171, 1994, 341\u2013352. http:\/\/www.dataglyphs.com","journal-title":"SPIE Proceedings"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"P. G. Howard, F. Kossentini, B. Martins, S. Forchhammer, and W. J. Rucklidge. The Emerging JBIG2 Standard. CSVT Vol. 8, November 1998, 838\u2013848.","DOI":"10.1109\/76.735380"},{"key":"1_CR13","unstructured":"Y. LeCun, L. Bottou, P. Haffner, P. Howard, P. Simard, and Y. Bengio. http:\/\/djvu.research.att.com and http:\/\/www.research.att.com\/~yann"},{"key":"1_CR14","unstructured":"S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O\u2019Gorman. Document marking and identification using both line and word shifting. Proc. IEEEInfocom\u201995, 1995."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Fred Mintzer, Jeffrey Lotspiech, Norishige Morimoto. Safeguarding digital library contents and users. D-Lib Magazine, December 1997. http:\/\/www.dlib.org\/dlib\/december97\/ibm\/12lotspiech.html","DOI":"10.1045\/december97-lotspiech"},{"key":"1_CR16","unstructured":"W. Wesley Peterson and E. J. Weldon. Error-Correcting Codes, 2nd Edition. MIT Press, 1972."},{"key":"1_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding: Second International Workshop","author":"F. A. P. Petitcolas","year":"1998","unstructured":"Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. Information Hiding: Second International Workshop, David Aucsmith, ed. LNCS 1525, Springer, 1998, 218\u2013238."},{"key":"1_CR18","series-title":"Lect Notes Comput Sci","volume-title":"Information Hiding: Third International Workshop","year":"2000","unstructured":"Andreas Pfitzmann, ed. Information Hiding: Third International Workshop, LNCS 1768, Springer, 2000."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"W. Rucklidge and D. Huttenlocher. A flexible network document imaging architecture. SPIE Electronic Imaging, San Jose, January 2000.","DOI":"10.1117\/12.373447"},{"key":"1_CR20","unstructured":"Matthias Ruhl, Marshall Bern, and David Goldberg. Secure notarization of paper text documents. Proc. of the 12th ACM-SIAM Symp. on Discrete Algorithms, SIAM, 2001."},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1147\/rd.24.0289","volume":"2","author":"C. Shannon","year":"1958","unstructured":"Claude Shannon. Channels with side information at the transmitter. IBM J. Research and Development, Vol 2. (1958), 289\u2013293. Reprinted in Key Papers in the Development of Information Theory, D. Slepian, ed. IEEE Press, 1974, Part A.","journal-title":"IBM J. Research and Development"},{"key":"1_CR22","unstructured":"Ming Ye, Marshall Bern, and David Goldberg. Document image matching and annotation lifting, To appear in Int. Conf. Document Analysis and Recognition, Seattle, 2001."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:40:28Z","timestamp":1556376028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}