{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:02:05Z","timestamp":1725483725730},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_8","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"96-111","source":"Crossref","is-referenced-by-count":8,"title":["Keyless Public Watermarking for Intellectual Property Authentication"],"prefix":"10.1007","author":[{"given":"Gang","family":"Qu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"8_CR1","unstructured":"A. Adelsbach, B. Pfitzmann, and A. Sadeghi. \u201cProving Ownership of Digital Content\u201d. The 3rd International Information Hiding Workshop, pp. 126\u2013141, September 1999."},{"key":"8_CR2","unstructured":"S. Craver. \u201cZero Knowledge Watermark Detection\u201d. The 3rd International Information Hiding Workshop, pp. 102\u2013115, September 1999."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"F. Hartung and B. Girod. \u201cFast Public-Key Watermarking of Compressed Video\u201d. IEEE International Conference on Image Processing, pp. 528\u2013531, October 1997.","DOI":"10.1109\/ICIP.1997.647966"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"A. B. Kahng, et al. \u201cWatermarking Techniques for Intellectual Property Protection\u201d. 35th Design Automation Conference Proceedings, pp. 776\u2013781, 1998.","DOI":"10.1145\/277044.277240"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"J. Lach, W. H. Mangione-Smith, and M. Potkonjak. \u201cFingerprinting Digital Circuits on Programmable Hardware\u201d. The 2nd International Information Hiding Workshop, pp. 16\u201331, April 1998.","DOI":"10.1007\/3-540-49380-8_2"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann. \u201cInformation Hiding Terminology\u201d, The 1st International Information Hiding Workshop, pp. 347\u2013350, May 1996.","DOI":"10.1007\/3-540-61996-8_52"},{"key":"8_CR7","unstructured":"G. Qu and M. Potkonjak. \u201cHiding Signatures in Graph Coloring Solutions\u201d. The 3rd International Information Hiding Workshop, pp. 391\u2013408, September 1999."},{"key":"8_CR8","unstructured":"Virtual Socket Interface Alliance. \u201cIntellectual Property Protection White Paper: Schemes, Alternatives and Discussion Version 1.0\u2013, September 2000."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:40:30Z","timestamp":1556376030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}