{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T04:49:44Z","timestamp":1745038184182},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_19","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"258-272","source":"Crossref","is-referenced-by-count":6,"title":["Automatic Detection of a Watermarked Document Using a Private Key"],"prefix":"10.1007","author":[{"given":"Julien P.","family":"Stern","sequence":"first","affiliation":[]},{"given":"Jean-Pierre","family":"Tillich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"19_CR1","unstructured":"J. Boeuf and J. P. Stern. An analysis of one of the SDMI candidates. These proceedings."},{"key":"19_CR2","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/ICIP.1996.560429","volume":"3","author":"I. Cox","year":"1996","unstructured":"I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In IEEE Int. Conference on Image Processing, volume 3, pages 243\u2013246, 1996.","journal-title":"IEEE Int. Conference on Image Processing"},{"key":"19_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Workshop on Information Hiding","author":"I. J. Cox","year":"1996","unstructured":"I. J. Cox, J.Kilian, T.Leighton, and T.Shamoon. A secure, robust watermark for multimedia. In Ross Anderson, editor, Workshop on Information Hiding, number 1174 in Lecture Notes in Computer Science. Springer-Verlag, 1996."},{"key":"19_CR4","unstructured":"Ingemar J. Cox and Matt L. Miller. A review of watermarking anf the importance of perceptual modeling. In Proc. of Electronic Imagining\u2019 97, 1997."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"J. Eggers, J. Su, and B. Girod. Asymmetric watermarking schemes. In Sicherheit en Mediendeten, 2000.","DOI":"10.1007\/978-3-642-58346-9_11"},{"key":"19_CR6","unstructured":"J. Eggers, J. Su, and B. Girod. Public key watermarking by eigenvectors of linear transforms. In EUSIPCO, 2000."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"T. Furon and P. Duhamel. An asymmetric public detection watermarking technique. In IH99, pages 88\u2013100, 1999.","DOI":"10.1007\/10719724_7"},{"key":"19_CR8","unstructured":"T. Furon and P. Duhamel. Robustness of an asymmetric technique. In ICIP 2000, 2000."},{"key":"19_CR9","unstructured":"T. Furon, I. Venturini, and P. Duhamel. A unified approach of asymmetric schemes. In E. Delp and P. Wah Wong, editors, Security and Watermarking of Multimedia Contents, number 4312 in Proceedings of SPIE. SPIE, 2001."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"F. Hartung and B. Girod. Digital watermarking of raw and compressed video. In SPIE 2952: Digital Compression Technologies and Systems for Video Communication, pages 205\u2013213, 1996.","DOI":"10.1117\/12.251278"},{"key":"19_CR11","series-title":"Lect Notes Comput Sci","first-page":"318","volume-title":"Information Hiding Workshop\u2019 99","author":"N. F. Johnson","year":"1999","unstructured":"N. F. Johnson, Z. Duric, and S. Jajodia. Recovery of watermarks from distorted images. In Andreas Pfitzmann, editor, Information Hiding Workshop\u2019 99, Lecture Notes in Computer Science, pages 318\u2013332. Springer-Verlag, 1999."},{"key":"19_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Second Workshop on Information Hiding","author":"F. A. P. Petitcolas","year":"1998","unstructured":"F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In David Aucsmith, editor, Second Workshop on Information Hiding, number 1525 in Lecture Notes in Computer Science, pages 218\u2013238. Springer-Verlag, 1998."},{"key":"19_CR13","series-title":"Lect Notes Comput Sci","first-page":"199","volume-title":"Information Hiding Workshop\u2019 99","author":"S. Perreira","year":"1999","unstructured":"S. Perreira and T. Pun. Fast robust template matching for affine resistant image watermarks. In Andreas Pfitzmann, editor, Information Hiding Workshop\u2019 99, Lecture Notes in Computer Science, pages 199\u2013210. Springer-Verlag, 1999."},{"key":"19_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology-Eurocrypt 96","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann and M. Schunter. Asymmetric fingerprinting (extended abstract). In Ueli Maurer, editor, Advances in Cryptology-Eurocrypt 96, number 1070 in Lecture Notes in Computer Science, pages 84\u201395. Springer-Verlag, 1996."},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"R. L. Pickholtz, D. L. Schilling, and L. B. Millstein. Theory of spread spectrum communications \u2014 a tutorial. In IEEE Trans. on Communications, pages 855\u2013884, 1982.","DOI":"10.1109\/TCOM.1982.1095533"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner. Asymmetric fingerprinting for larger collusions. In 4th ACM Conference on Computer and Communications Security, pages 151\u2013160, 1997.","DOI":"10.1145\/266420.266453"},{"key":"19_CR17","series-title":"Lect Notes Comput Sci","first-page":"77","volume-title":"Third Workshop on Information Hiding","author":"J. Smith","year":"1999","unstructured":"J. Smith and C. Dodge. Develoments in steganography. In Andreas Pfitzmann, editor, Third Workshop on Information Hiding, number 1768 in Lecture Notes in Computer Science, pages 77\u201387. Springer-Verlag, 1999."},{"key":"19_CR18","unstructured":"J. P. Stern and J-P. Tillich. Automatic detection of a watermarked document using a single private key. full version. http:\/\/www.julienstern.org\/files\/detection\/"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"R. Van Schyndel, A. Tirkel, and I. Svalbe. Key independent watermark detection. Int. Conf. on Multimedia Computing and Systmes. volume 1, 1999.","DOI":"10.1109\/MMCS.1999.779265"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T18:40:27Z","timestamp":1556390427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}