{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:54:28Z","timestamp":1776887668219,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540427339","type":"print"},{"value":"9783540454960","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_20","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"273-288","source":"Crossref","is-referenced-by-count":53,"title":["Zero-Knowledge Watermark Detection and Proof of Ownership"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Adelsbach","sequence":"first","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"20_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/10719724_9","volume-title":"Information Hiding: Third International Workshop","author":"A. Adelsbach","year":"2000","unstructured":"Andr\u00e9 Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving Ownership of Digital Content; Information Hiding: Third International Workshop, LNCS 1768, Springer-Verlag, Berlin, 2000, pp. 117\u2013133"},{"key":"20_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/3-540-48071-4_28","volume-title":"Crypto\u2019 92","author":"M. Bellare","year":"1993","unstructured":"Mihir Bellare, Oded Goldreich: On Defining Proofs of Knowledge; Crypto\u2019 92, LNCS 740, Springer-Verlag, Berlin 1993, pp. 390\u2013420"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"1st ACM Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"Mihir Bellare, Phillip Rogaway: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols; 1st ACM Conference on Computer and Communications Security, ACM Press, New York, 1993, pp. 62\u201373"},{"key":"20_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Crypto\u2019 95","author":"D. Boneh","year":"1995","unstructured":"Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto\u2019 95, LNCS 963, Springer-Verlag, Berlin 1995, pp. 452\u2013465"},{"key":"20_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/3-540-45539-6_31","volume-title":"Eurocrypt\u2019 00","author":"F. Boudot","year":"2000","unstructured":"Fabrice Boudot: Efficient Proofs that a Committed Number Lies in an Interval; Eurocrypt\u2019 00, LNCS 1807, Springer-Verlag, Berlin 2000, pp. 431\u2013444"},{"key":"20_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/3-540-48910-X_8","volume-title":"Eurocrypt\u2019 99","author":"J. Camenisch","year":"1999","unstructured":"Jan Camenisch, Markus Michels: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes; Eurocrypt\u2019 99, LNCS 1592, Springer-Verlag, Berlin, 1999, pp. 107\u2013122"},{"key":"20_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/10719724_8","volume-title":"Information Hiding: Third International Workshop","author":"S. Craver","year":"2000","unstructured":"Scott Craver: Zero Knowledge Watermark Detection; Information Hiding: Third International Workshop, LNCS 1768, Springer-Verlag, Berlin, 2000, pp. 101\u2013116"},{"key":"20_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-61996-8_41","volume-title":"Information Hiding","author":"I. J. Cox","year":"1996","unstructured":"Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon: A Secure, Robust Watermark for Multimedia; Information Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, pp. 185\u2013206"},{"issue":"4","key":"20_CR9","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"S. Craver","year":"1998","unstructured":"Scott Craver, Nasir Memon, Boon-Lock Yeo, Minerva M. Yeung: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications; IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, Mai 1998, pp. 573\u2013586","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"20_CR10","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"I. J. Cox","year":"1998","unstructured":"Ingemar J. Cox, Jean-Paul M. G. Linnartz: Some General Methods for Tampering with Watermarks, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May 1998, pp. 587\u2013593","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"20_CR11","volume-title":"Sicherheit in Mediendaten","author":"J. J. Eggers","year":"2000","unstructured":"J. J. Eggers, J. K. Su, B. Girod: Asymmetric Watermarking Schemes; Sicherheit in Mediendaten, Berlin, Germany, Springer Reihe: Informatik Aktuell, September 2000"},{"key":"20_CR12","unstructured":"J. J. Eggers, J. K. Su, B. Girod: Public Key Watermarking By Eigenvectors of Linear Transforms; European Signal Processing Conference, Tampere, Finland, September 2000"},{"key":"20_CR13","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Crypto\u2019 86","author":"A. Fiat","year":"1987","unstructured":"Amos Fiat, Adi Shamir: How to Prove Yourself: Practical Solutions to Identification and Signature Problems; Crypto\u2019 86, LNCS 263, Springer-Verlag, Berlin 1987, pp. 186\u2013194"},{"key":"20_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/10719724_7","volume-title":"Third International Workshop","author":"T. Furon","year":"2000","unstructured":"Teddy Furon, Pierre Duhamel: An Asymmetric Public Detection Watermarking Technique; Information Hiding: Third International Workshop, LNCS 1768, Springer-Verlag, Berlin, 2000, pp. 88\u2013100"},{"key":"20_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/BFb0054115","volume-title":"Eurocrypt\u2019 98","author":"E. Fujisaki","year":"1998","unstructured":"Eiichiro Fujisaki, Tatsuaki Okamoto: A practical and provably secure scheme for publicly verifiable secret sharing and its applications; Eurocrypt\u2019 98, LNCS 1403, Springer-Verlag, Berlin 1998, pp. 32\u201346"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18\/1","author":"S. Goldwasser","year":"1989","unstructured":"Shafi Goldwasser, Silvio Micali, Charles Rackoff: The Knowledge Complexity of Interactive Proof Systems; SIAM Journal on Computing 18\/1 (1989), pp. 186\u2013207.","journal-title":"SIAM Journal on Computing"},{"issue":"1","key":"20_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00195207","volume":"7","author":"O. Goldreich","year":"1994","unstructured":"Oded Goldreich, Jair Oren: Definitions and Properties of Zero-Knowledge Proof Systems; Journal of Cryptology, 1994, 7(1), pp. 1\u201332","journal-title":"Journal of Cryptology"},{"key":"20_CR18","unstructured":"K. Gopalakrishnan, Nasi Memon, Poorvi Vora: Protocols for Watermark Verification; Multimedia and Security, Workshop at ACM Multimedia 1999, pp. 91\u201394"},{"issue":"7","key":"20_CR19","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F. Hartung","year":"1999","unstructured":"Frank Hartung, Martin Kutter: Multimedia Watermarking Techniques; Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. 1079\u20131107","journal-title":"Proceedings of the IEEE"},{"key":"20_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/3-540-49380-8_13","volume-title":"Information Hiding","author":"A. Herrigel","year":"1998","unstructured":"Alexander Herrigel, Joseph \u00d3 Ruanaidh, Holger Petersen, Shelby Pereira, Thierry Pun: Secure Copyright Protection Techniques for Digital Images; Information Hiding, LNCS 1525, Springer-Verlag, Berlin, 1998, pp. 169\u2013190"},{"key":"20_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/3-540-49380-8_18","volume-title":"Information Hiding: Second International Workshop","author":"J.-P. M. G. Linnartz","year":"1998","unstructured":"Jean-Paul M. G. Linnartz, Marten van Dijk: Analysis of the Sensitivity Attack against Electronic Watermarks in Images; Information Hiding: Second International Workshop; LNCS 1525, Springer-Verlag, Berlin 1998, pp. 258\u2013272"},{"key":"20_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Eurocrypt\u2019 96","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting (Extended Abstract); Eurocrypt\u2019 96, LNCS 1070, Springer-Verlag, Berlin 1996, pp. 84\u201395"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Lintian Qiao, Klara Nahrstedt: Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership; International Conference on Multimedia Computing and Systems, Austin, Texas, USA, 1998, pp. 276\u2013285","DOI":"10.1109\/MMCS.1998.693656"},{"issue":"6","key":"20_CR24","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/5.687830","volume":"86","author":"M. D. Swanson","year":"1998","unstructured":"Mitchell D. Swanson, Mei Kobayashi, Ahmed H. Tewfik: Multimedia DataEmbedding and Watermarking Technologies; Proceedings of the IEEE, Vol. 86, No. 6, June 1998, pp. 1064\u20131087","journal-title":"Proceedings of the IEEE"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T02:14:39Z","timestamp":1736993679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}