{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:02:42Z","timestamp":1766466162683},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_25","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"340-353","source":"Crossref","is-referenced-by-count":96,"title":["Second Generation Benchmarking and Application Oriented Evaluation"],"prefix":"10.1007","author":[{"given":"Shelby","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Sviatoslav","family":"Voloshynovskiy","sequence":"additional","affiliation":[]},{"given":"Maribel","family":"Madueno","sequence":"additional","affiliation":[]},{"given":"St\u00e9phan","family":"Marchand-Maillet","sequence":"additional","affiliation":[]},{"given":"Thierry","family":"Pun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"M. Barni, F. Bartolini, A. De Rosa, and A. Piva. A new decoder for the optimum recovery of non-additive watermarks. IEEE Transactions on Image Processing, submitted 2000.","DOI":"10.1109\/83.918568"},{"key":"25_CR2","unstructured":"Certimark european project, 2000\u20132002."},{"key":"25_CR3","unstructured":"Digimarc Corporation. http:\/\/www.digirnarc.com\/ . January 1997."},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In Proceedings of the IEEE Int. Conf. on Image Processing ICIP-96, pages 243\u2013246, Lausanne, Switzerland, 1996.","DOI":"10.1109\/ICIP.1996.560429"},{"issue":"4","key":"25_CR5","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"I. J. Cox","year":"1998","unstructured":"I. J. Cox and J.-P. M. G. Linnartz. Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications, 16(4):587\u2013593, May 1998.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung. Can invisible watermark resolve rightful ownerships? In Fifth Conference on Storage and Retrieval for Image and Video Database, volume 3022, pages 310\u2013321, San Jose, CA, USA, February 1997.","DOI":"10.1117\/12.263419"},{"key":"25_CR7","volume-title":"Three-Dimensional Computer Vision","author":"O. Faugeras","year":"1993","unstructured":"O. Faugeras. Three-Dimensional Computer Vision. The MIT Press, Cambridge Massachusetts, 1993."},{"key":"25_CR8","series-title":"PhD thesis","volume-title":"Digital image watermarking: hiding information in images","author":"M. Kutter","year":"1999","unstructured":"M. Kutter. Digital image watermarking: hiding information in images. PhD thesis, EPFL, Lausanne, Switzerland, August 1999."},{"key":"25_CR9","unstructured":"M. Kutter, S. Voloshynovskiy, and A. Herrigel. Watermark copy attack. In Ping Wah Wong and Edward J. Delp, editors, IS&T\/SPIE\u2019s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, volume 3971 of SPIE Proceedings, San Jose, California USA, 23\u201328 jan 2000."},{"key":"25_CR10","unstructured":"MediaSec. http:\/\/www.mediasec.com\/products\/download\/ . March 2000."},{"issue":"3","key":"25_CR11","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"J. O. Ruanaidh","year":"1998","unstructured":"J. O Ruanaidh and T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 66(3):303\u2013317, 1998.","journal-title":"Signal Processing"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"S. Pereira, J. J. Ruanaidh, F. Deguillaume, G. Csurka, and T. Pun. Template based recovery of Fourier-based watermarks using Log-polar and Log-log maps. In Int. Conference on Multimedia Computing and Systems, Special Session on Multimedia Data Security and Watermarking, June 1999.","DOI":"10.1109\/MMCS.1999.779316"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"S. Pereira and T. Pun. Fast robust template matching for affine resistant watermarks. In 3rd International Information Hiding Workshop, Dresden, Germany, September 1999.","DOI":"10.1007\/10719724_15"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"S. Pereira, S. Voloshynovskiy, and T. Pun. Effective channel coding for DCT watermarks. In International Conference on Image Processing (ICIP\u20192000), Vancouver, Canada, September 2000.","DOI":"10.1109\/ICIP.2000.899543"},{"key":"25_CR15","unstructured":"Shelby Pereira and Thierry Pun. A framework for optimal adaptive DCT watermarks using linear programming. In Tenth European Signal Processing Conference (EUSIPCO\u20192000), Tampere, Finland, sep 5\u20138 2000."},{"key":"25_CR16","unstructured":"A. Perrig. A copyright protection environment for digital images. Diploma dissertation. Ecole Polytechnique Federal de Lausanne, Lausanne, Switzerland, February, 1997."},{"key":"25_CR17","unstructured":"F. A. P. Petitcolas. http:\/\/www.cl.cam.ac.uk\/fapp2\/watermarking\/stirmark\/ . In Stirmark3.1 (79), 1999."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"F. A. P. Petitcolas and R. J. Anderson. Attacks on copyright marking systems. In D. Aucsmith, editor, 2nd International Information Hiding Workshop, pages 219\u2013239, Portland, Oregon, USA, April 1998.","DOI":"10.1007\/3-540-49380-8_16"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"F. A. P. Petitcolas and R. J. Anderson. Evaluation of copyright marking systems. In IEEE Multimedia Systems (ICMCS\u201999), volume 1, pages 574\u2013579, Florence, Italy, June 1999.","DOI":"10.1109\/MMCS.1999.779264"},{"key":"25_CR20","unstructured":"C. I. Podilchuk and W. Zeng. Perceptual watermarking of still images. In Proc. Electronic Imaging, volume 3016, San Jose, CA, USA, February 1996."},{"key":"25_CR21","unstructured":"Unzign watermark removal software, July 1997."},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy, A. Herrigel, and T. Pun. Blur\/deblur attack against document protection systems based on digital watermarking. In Information Hiding Workhop 2001, Pittsburg, USA, April 2001.","DOI":"10.1007\/3-540-45496-9_24"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumg\u00e4rtner, and T. Pun. A generalized watermark attack based on stochastic watermark estimation and perceptual remodulation. In Ping Wah Wong and Edward J. Delp, editors, IS&T\/SPIE\u2019s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, volume 3971 of SPIE Proceedings, San Jose, California USA, 23\u201328 January 2000. (Paper EI 3971-34).","DOI":"10.1117\/12.384990"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modelling: Towards a second generation watermarking benchmark. Signal Processing, June 2001.","DOI":"10.1016\/S0165-1684(01)00039-1"},{"key":"25_CR25","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1117\/12.152694","volume":"1913","author":"A. B. Watson","year":"1993","unstructured":"A. B. Watson. DCT quantization matrices visually optimized for individual images. In Proc. SPIE:Human vision, Visual Processing and Digital Display IV, volume 1913, pages 202\u2013216. SPIE, 1993.","journal-title":"Proc. SPIE:Human vision, Visual Processing and Digital Display IV"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T18:40:35Z","timestamp":1556390435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}