{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T04:49:44Z","timestamp":1745038184553},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_11","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"142-156","source":"Crossref","is-referenced-by-count":4,"title":["Neural Networks Functions for Public Key Watermarking"],"prefix":"10.1007","author":[{"given":"Justin","family":"Picard","sequence":"first","affiliation":[]},{"given":"Arnaud","family":"Robert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1117\/12.344684","volume":"3657","author":"B. Chen","year":"1999","unstructured":"B. Chen and G. W. Wornell. Dither modulation: A new approach to digital watermarking and information embedding. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3657, pages 342\u2013353, 1999.","journal-title":"Proc. of SPIE: Security and Watermarking of Multimedia Contents"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"I. J. Cox and J. P. M. G. Linnartz. Public watermarks and resistance to tampering. In International Conference on Image Processing, 1997.","DOI":"10.1109\/ICIP.1997.632226"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"J. J. Eggers, J. K. Su, and B. Girod. Asymmetric watermarking schemes. In Tagung-band des GlWorkshops, 2000.","DOI":"10.1007\/978-3-642-58346-9_11"},{"key":"11_CR4","unstructured":"J. J. Eggers, J. K. Su, and B. Girod. Public key watermarking by eigenvectors of linear transforms. In EUSIPCO, 2000."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"T. Furon and P. Duhamel. An asymmetric public detection scheme. In Information Hiding Workshop, pages 88\u2013100, 1999.","DOI":"10.1007\/10719724_7"},{"key":"11_CR6","first-page":"21","volume":"3","author":"T. Furon","year":"2000","unstructured":"T. Furon and P. Duhamel. Robustness of asymmetric watermarking technique. In IEEE International Conference on Image Processing, volume 3, pages 21\u201324, 2000","journal-title":"IEEE International Conference on Image Processing"},{"issue":"l","key":"11_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/83.817598","volume":"9","author":"J. R. Hernandez","year":"2000","unstructured":"J. R. Hernandez, M. Amado, and F. Perez-Gonzalez. Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing, 9(l):55\u201368, 2000.","journal-title":"IEEE Trans. on Image Processing"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"T. Kalker, J. P. M. G. Linnartz, and M. van Dijk. Watermark estimation through detector analysis. In International Conference on Image Processing, 1998.","DOI":"10.1109\/ICIP.1998.723516"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"J. P. M. G. Linnartz and M. van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In Workshop on Information Hiding, 1998.","DOI":"10.1007\/3-540-49380-8_18"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"J. Picard and A. Robert. On the public key watermarking issue. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3971, 2001","DOI":"10.1117\/12.435410"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"A. Robert and J. Picard. Masking models and watermark unDetection. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3971, 2001.","DOI":"10.1117\/12.435429"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"J. R. Smith and C. Dodge. Developments in steganography. In Information Hiding Workshop, pages 77\u201387, 1999.","DOI":"10.1007\/10719724_6"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"R. G. van Schyndel, A. Z. Tirkel, and I. D. Svalbe. Key independent watermark detection. In Proceedings of the IEEE Intl. Conference on Multimedia Computing and Systems, volume 1, Florence, Italy, 1999.","DOI":"10.1109\/MMCS.1999.779265"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:40:25Z","timestamp":1556376025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}