{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:02:02Z","timestamp":1725483722500},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_29","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"395-410","source":"Crossref","is-referenced-by-count":10,"title":["An Analysis of One of the SDMI Candidates"],"prefix":"10.1007","author":[{"given":"Julien","family":"Boeuf","sequence":"first","affiliation":[]},{"given":"Julien P.","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"29_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Second Workshop on Information Hiding","year":"1998","unstructured":"David Aucsmith, editor. Second Workshop on Information Hiding, number 1525 in Lecture Notes in Computer Science. Springer-Verlag, 1998."},{"key":"29_CR2","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/ICIP.1996.560429","volume":"3","author":"I. Cox","year":"1996","unstructured":"I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In IEEE Int. Conference on Image Processing, volume 3, pages 243\u2013246, 1996.","journal-title":"IEEE Int. Conference on Image Processing"},{"key":"29_CR3","unstructured":"S. Craver, P. McGregor, M. Wu, B. Liu, A. Stubblefield, B. Swartlander, D. S. Wallach, D. Dean, and E. W. Felten. http:\/\/www.cs.princeton.edu\/sip\/sdmi\/ ."},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Franz Hartung and Bernd Girod. Digital watermarking of raw and compressed video. In SPIE 2952: Digital Compression Technologies and Systems for Video Communication, pages 205\u2013213, 1996.","DOI":"10.1117\/12.251278"},{"key":"29_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/10719724_22","volume-title":"Information Hiding Workshop\u2019 99","author":"N. F. Johnson","year":"2000","unstructured":"N. F. Johnson, Z. Duric, and S. Jajodia. Recovery of watermarks from distorted images. In Andreas Pfitzmann, editor, Information Hiding Workshop\u2019 99, Lecture Notes in Computer Science, pages 318\u2013332. Springer-Verlag, 1999."},{"key":"29_CR6","unstructured":"Leonardo Chiariglione (Executive Director of the SDMI group). An open letter to the digital community. http:\/\/www.hacksdmi.org\/letter.asp"},{"key":"29_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Second Workshop on Information Hiding","author":"F. A. P. Petitcolas","year":"1998","unstructured":"Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In David Aucsmith, editor, Second Workshop on Information Hiding, number 1525 in Lecture Notes in Computer Science, pages 218\u2013238. Springer-Verlag, 1998."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Information hiding. a survey. In Proceedings of the IEEE, special issue on protection of multimedia content, 1999.","DOI":"10.1109\/5.771065"},{"key":"29_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Third Workshop on Information Hiding","year":"1999","unstructured":"Andreas Pfitzmann, editor. Third Workshop on Information Hiding, number 1768 in Lecture Notes in Computer Science. Springer-Verlag, 1999."},{"key":"29_CR10","series-title":"Lect Notes Comput Sci","first-page":"199","volume-title":"Information Hiding Workshop\u2019 99","author":"S. Perreira","year":"1999","unstructured":"Shelby Perreira and Thierry Pun. Fast robust template matching for affine resistant image watermarks. In Andreas Pfitzmann, editor, Information Hiding Workshop\u2019 99, Lecture Notes in Computer Science, pages 199\u2013210. Springer-Verlag, 1999."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:40:19Z","timestamp":1556376019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}