{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T01:26:19Z","timestamp":1751073979163},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540653868"},{"type":"electronic","value":"9783540493808"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49380-8_17","type":"book-chapter","created":{"date-parts":[[2007,8,3]],"date-time":"2007-08-03T18:38:00Z","timestamp":1186166280000},"page":"239-257","source":"Crossref","is-referenced-by-count":9,"title":["Testing Digital Watermark Resistance to Destruction"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"Sowers","sequence":"first","affiliation":[]},{"given":"Abdou","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,11,30]]},"reference":[{"unstructured":"Raymond B. Wolfgang and Edward J. Delp. \u201cOverview of image security techniques with applications in multimedia systems\u201d. http:\/\/www.dynamo.ecn.purdue.edu\/~ace\/water\/digwmk.html","key":"17_CR1"},{"doi-asserted-by":"crossref","unstructured":"R. G. van Schyndel, A. Z. Tirkel, C. F. Osborne. \u201cA Digital Watermark\u201d, Proceedings of the International Conference on Image Processing, November, 1994, Austin, Texas, vol. 2, pp. 86\u201390.","key":"17_CR2","DOI":"10.1109\/ICIP.1994.413536"},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R. Anderson","year":"1998","unstructured":"Ross Anderson and Fabien Petitcolas. \u201cOn the Limits of Steganography\u201d. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection, vol. 16 no. 4, pp 474\u2013481, May 1998. http:\/\/www.cl.cam.ac.uk\/~fapp2\/papers\/jsac98-limsteg\/","journal-title":"IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection"},{"doi-asserted-by":"crossref","unstructured":"Walter Bender, Daniel Gruhl and Norishige Morimoto. \u201cTechniques for Data Hiding\u201d. Proceedings of the SPIE, volume 2420, February 1995, p. 40.","key":"17_CR4","DOI":"10.1117\/12.205315"},{"unstructured":"E. Koch and Z. Zhao. \u201cTowards Robust and Hidden Image Copyright Labeling\u201d. Proceedings of the 1995 IEEE Workshop on Non-Linear Signal and Image Processing, June 1995.","key":"17_CR5"},{"doi-asserted-by":"crossref","unstructured":"I. Pitas. \u201cA Method for Signature Casting on Digital Images\u201d. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 215\u2013218.","key":"17_CR6","DOI":"10.1109\/ICIP.1996.560422"},{"unstructured":"I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. \u201cSecure Spread Spectrum Watermarking for Images, Audio, and Video\u201d. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 243\u2013246.","key":"17_CR7"},{"unstructured":"J. J. K. \u00f3. Ruanaidh, W. J. Dowling, and F. M. Boland. \u201cPhase Watermarking of Digital Images\u201d. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 239\u2013242.","key":"17_CR8"},{"doi-asserted-by":"crossref","unstructured":"Christine Podilchuk and Wenjun Zeng. \u201cPerceptual Watermarking of Still Images\u201d. Proceedings of the IEEE MMSP Workshop, Princeton, June 1997, pp. 363\u2013368.","key":"17_CR9","DOI":"10.1109\/MMSP.1997.602662"},{"unstructured":"Christine Podilchuk and Wenjun Zeng. \u201cWatermarking of the JPEG Bitstream\u201d. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST\u2019 97 International Conference, pp. 253\u2013260.","key":"17_CR10"},{"unstructured":"Raymond B. Wolfgang and Edward J. Delp. \u201cA Watermarking Technique for Digital Imagery: Further Studies\u201d. Proceedings of the International Conference on Imaging Science, System, and Technology. CISST\u2019 97 International Conference, pp. 279\u2013284.","key":"17_CR11"},{"unstructured":"Tsung-Li Wu and S. Felix Wu. \u201cSelective Encryption and Watermarking of MPEG Video\u201d. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST\u2019 97 International Conference, pp. 261\u2013269.","key":"17_CR12"},{"unstructured":"Dave Benham, Nasir Memon, et. al. \u201cFast Watermarking of DCT-based Compressed Images\u201d. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST\u2019 97 International Conference, pp. 243\u2013252.","key":"17_CR13"},{"doi-asserted-by":"crossref","unstructured":"R. Wolfgang and E. Delp. \u201cA Watermark for Digital Images\u201d. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16\u201319, 1996, volume 3, pp. 219\u2013222.","key":"17_CR14","DOI":"10.1109\/ICIP.1996.560423"},{"key":"17_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/3-540-61996-8_52","volume-title":"Proceedings of Information Hiding","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann. \u201cInformation Hiding Terminology\u201d. Proceedings of Information Hiding. Springer Lecture Notes in Computer Science, volume 1174 (1996), pp. 347\u2013350."},{"doi-asserted-by":"crossref","unstructured":"Ross Anderson. \u201cStretching the Limits of Steganography\u201d. In Proceedings of the First Workshop on Information Hiding, 1996, pp. 39\u201348 http:\/\/www.cl.cam.ac.uk\/ftp\/users\/rja14\/stegan.ps.gz","key":"17_CR16","DOI":"10.1007\/3-540-61996-8_30"},{"unstructured":"M. Yeung and F. C. Mintzer. \u201cDigital Watermarking for High Quality Images\u201d. 1997 IEEE Proceedings of the International Conferences on Image Processing, pp. 357\u2013362.","key":"17_CR17"},{"unstructured":"J. Brassil, S. Low, N. Maxemchuk, and L. O\u2019Gorman. \u201cElectronic Marking and Identification Techniques to Discourage Document Copying\u201d. Proceedings of Infocom\u2019 94, pp. 1278\u20131287, 1994.","key":"17_CR18"},{"unstructured":"Richard Wiggins. \u201cStop Those Copyright Claim Jumpers!: Corralling Your Content\u201d. NewMedia, http:\/\/www.newmedia.com , pp. 40\u201344, October 13, 1997.","key":"17_CR19"},{"unstructured":"R. Gonzalez and R. Woods. Digital Image Processing. Second Edition. Addison-Wesley Publishing, 1993.","key":"17_CR20"},{"key":"17_CR21","volume-title":"Digital Copyright Protection. AP Professional","author":"P. Wayner","year":"1997","unstructured":"Peter Wayner. Digital Copyright Protection. AP Professional, Chestnut Hill, Massachusetts, 1997."},{"doi-asserted-by":"crossref","unstructured":"M. Swanson, B. Zhu and A. Tewfik. \u201cTransparent Robust Image Watermarking\u201d. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16\u201319, 1996, volume 3, pp. 211\u2013214.","key":"17_CR22","DOI":"10.1109\/ICIP.1996.560421"},{"key":"17_CR23","volume-title":"Introduction to Data Compression","author":"K. Sayood","year":"1996","unstructured":"Khalid Sayood. Introduction to Data Compression. Morgan Kaufman Publishers, Inc., San Francisco, California, 1996."},{"key":"17_CR24","doi-asserted-by":"publisher","DOI":"10.1117\/3.34917","volume-title":"Digital Image Compression Techniques","author":"M. Rabbani","year":"1991","unstructured":"Majid Rabbani and Paul W. Jones. Digital Image Compression Techniques. SPIE Optical Engineering Press, Bellingham Washington, 1991."},{"issue":"11","key":"17_CR25","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/265684.265687","volume":"40","author":"H. Berghel","year":"1997","unstructured":"Hal Berghel. \u201cWatermarking Cyberspace\u201d. Communications of the ACM, November1997, volume 40, No. 11, pp. 19\u201324.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49380-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T18:55:58Z","timestamp":1556736958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49380-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540653868","9783540493808"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-49380-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}