{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:01:50Z","timestamp":1725483710349},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_23","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"316-330","source":"Crossref","is-referenced-by-count":3,"title":["Practical Capacity of Digital Watermarks"],"prefix":"10.1007","author":[{"given":"Ryo","family":"Sugihara","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"23_CR1","unstructured":"M. Barni, F. Bartolini, A. Piva, and F. Rigacci, \u201cStatistical modelling of full frame dct coefficients\u201d, Proceedings of EUSIPCO\u201998, pp. 1513\u20131516, 1998"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1117\/12.344694","volume":"3657","author":"M. Barni","year":"1999","unstructured":"M. Barni, F. Bartolini, A. De Rosa, and A. Piva, \u201cCapacity of the Watermark-Channel: How Many Bits Can Be Hidden Within a Digital Image?\u201d, Proceedings of SPIE, Vol. 3657, pp. 437\u2013448, 1999","journal-title":"Proceedings of SPIE"},{"issue":"3\/4","key":"23_CR3","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"W. Bender, D. Gruhl, N. Morimoto, and A. Lu, \u201cTechniques for data hiding\u201d, IBM Systems Journal, Vol. 35, No. 3\/4, pp. 313\u2013336, 1996","journal-title":"IBM Systems Journal"},{"issue":"12","key":"23_CR4","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. J. Cox","year":"1997","unstructured":"I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, \u201cSecure Spread Spectrum Watermarking for Multimedia\u201d, IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673\u20131687, 1997","journal-title":"IEEE Transactions on Image Processing"},{"issue":"7","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1109\/5.771069","volume":"87","author":"J. Hernandez","year":"1999","unstructured":"J. Hernandez and F. Perez-Gonzalez, \u201cStatistical analysis of watermarking schemes for copyright protection on images\u201d, Proceedings of the IEEE, Vol. 87, No. 7, pp. 1142\u20131166, 1999","journal-title":"Proceedings of the IEEE"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 2000","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1117\/12.344659","volume":"3657","author":"G. C. Langelaar","year":"1999","unstructured":"G. C. Langelaar, R. L. Lagendijk, and J. Biemond, \u201cWatermarking by DCT coefficient removal: a statistical approach to optimal parameter settings\u201d, Proceedings of SPIE, Vol. 3657, pp. 2\u201313, 1999","journal-title":"Proceedings of SPIE"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"P. Moulin and J. A. O\u2019Sullivan, \u201cInformation-theoretic analysis of watermarking\u201d, Proceedings of ICASSP\u20192000, pp. 3630\u20133633, 2000","DOI":"10.1109\/ICASSP.2000.860188"},{"key":"23_CR9","unstructured":"W. W. Peterson and E. J. Weldon, Error-Correcting Codes, 2nd ed., MIT Press, 1972"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1117\/12.337438","volume":"3528","author":"M. Ramkumar","year":"1998","unstructured":"M. Ramkumar and A. N. Akansu, \u201cTheoretical Capacity Measures for Data Hiding in Compressed Images\u201d, Proceedings of SPIE, Vol. 3528, pp. 482\u2013492, 1998","journal-title":"Proceedings of SPIE"},{"key":"23_CR11","first-page":"445","volume":"1","author":"S. D. Servetto","year":"1998","unstructured":"S. D. Servetto, C. I. Podilchuk, and K. Ramachandran, \u201cCapacity Issues in Digital Watermarking\u201d, Proceedings ofICIP, Vol. 1, pp. 445\u2013448, 1998","journal-title":"Proceedings ofICIP"},{"key":"23_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/3-540-61996-8_42","volume-title":"Information Hiding: First International Workshop","author":"J. R. Smith","year":"1996","unstructured":"J. R. Smith and B. O. Comiskey, \u201cModulation and Information Hiding in Images\u201d, Information Hiding: First International Workshop, Vol. 1174 of Lecture Notes in Computer Science, pp. 207\u2013226, 1996"},{"issue":"6","key":"23_CR13","first-page":"353","volume":"45","author":"B. Widrow","year":"1995","unstructured":"B. Widrow, I. Kollar, and M.-C. Liu, \u201cStatistical theory of quantization\u201d, IEEE Trans. on Instrumentation and Measurement, Vol. 45, No. 6, pp. 353\u2013361, 1995","journal-title":"IEEE Trans. on Instrumentation and Measurement"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T18:40:23Z","timestamp":1556390423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}