{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T05:40:26Z","timestamp":1737006026316,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_24","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"330-339","source":"Crossref","is-referenced-by-count":1,"title":["Blur\/Deblur Attack against Document Protection Systems Based on Digital Watermarking"],"prefix":"10.1007","author":[{"given":"Sviatoslav","family":"Voloshynovskiy","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Herrigel","sequence":"additional","affiliation":[]},{"given":"Thierry","family":"Pun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"S. Carr B. Perry and P. Patterson. Digital watermarks as a security feature for identity documents. In R. van Renesse and W. Vliegenthart, editors, SPIE\u2019s 12th Annual Symposium, Electronic Imaging 2000: Optical Seciruty and Counterfeit Deterrence Techniques III, volume 3973 of SPIE Proceedings, pages 80\u201387, San Jose, California USA, 27\u201328 January 2000.","DOI":"10.1117\/12.382214"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"A. Katsaggelos ed. Digital image restoration. Springer Verlag, 1991.","DOI":"10.1007\/978-3-642-58216-5"},{"issue":"6","key":"24_CR3","first-page":"367","volume":"14","author":"D. Geman","year":"1984","unstructured":"D. Geman and S. Geman. Stochastic relaxation, gibbs distributions and the bayesian restorations of images. IEEE Trans. on Pattern Analysis and Machine Intelligence, 14(6):367\u2013383, 1984.","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"A. Herrigel, S. Voloshynovskiy, and Z. Hrytskiv. Optical\/digital identification\/verification system based on digital watermarking technology. In SPIE International Workshop on Optoelectronic and Hybrid Optical\/Digital Systems for Image\/Signal Processing ODS\u201999, SPIE Proceedings, Lviv, Ukraine, 20\u201324 sep 1999.","DOI":"10.1117\/12.388440"},{"key":"24_CR5","unstructured":"M. Kutter, S. Voloshynovskiy, and A. Herrigel. Watermark copy attack. In Ping Wah Wong and Edward J. Delp, editors, IS&T\/SPIE\u2019s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, volume 3971 of SPIE Proceedings, San Jose, California USA, 23\u201328 jan 2000."},{"key":"24_CR6","unstructured":"J. Liu and P. Moulin. Complexity-regularized image denoising. In Proc. of 4th IEEE International Conference on Image Processing ICIP97, pages 370\u2013373, Santa-Barbara, CA, 1997."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"F. A. P. Petitcolas and R. J. Anderson. Attacks on copyright marking systems. In 2nd International Information Hiding Workshop, pages 219\u2013239, Portland, Oregon, USA, April 1998.","DOI":"10.1007\/3-540-49380-8_16"},{"key":"24_CR8","unstructured":"Fabien Petitcolas. http:\/\/www.cl.cam.ac.uk\/fapp2\/watermarking\/ ."},{"key":"24_CR9","unstructured":"European project Certimark. http:\/\/www.certimark.org\/ ."},{"key":"24_CR10","unstructured":"G. Rhoads. Digital watermarking and banknotes. European patent application # 0961239A2, 1999."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"A. Jaffe S. Church, R. Fuller and L. Pagano. Counterfeit detterrence and digital imaging technology. In R. van Renesse and W. Vliegenthart, editors, SPIE\u2019s 12th Annual Symposium, Electronic Imaging 2000: Optical Seciruty and Counterfeit Deterrence Techniques III, volume 3973 of SPIE Proceedings, pages 37\u201346, San Jose, California USA, 27\u201328 January 2000.","DOI":"10.1117\/12.382206"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"S. Spannenburg. Developments in digital document security. In R. van Renesse and W. Vliegenthart, editors, SPIE\u2019s 12th Annual Symposium, Electronic Imaging 2000: Optical Seciruty and Counterfeit Deterrence Techniques III, volume 3973 of SPIE Proceedings, pages 88\u201398, San Jose, California USA, 27\u201328 January 2000.","DOI":"10.1117\/12.382178"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modelling: Towards a second generation watermarking benchmark. Signal Processing, accepted, Jauary 2001.","DOI":"10.1016\/S0165-1684(01)00039-1"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T02:14:43Z","timestamp":1736993683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}