{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:19:31Z","timestamp":1725664771013},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540610281"},{"type":"electronic","value":"9783540498490"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61028-6_28","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T21:10:31Z","timestamp":1330290631000},"page":"229-243","source":"Crossref","is-referenced-by-count":1,"title":["Equitable conditional access and copyright protection for image based on trusted third parties"],"prefix":"10.1007","author":[{"given":"J. -M.","family":"Boucqueau","sequence":"first","affiliation":[]},{"given":"S.","family":"Lacroix","sequence":"additional","affiliation":[]},{"given":"B.","family":"Macq","sequence":"additional","affiliation":[]},{"given":"J. -J.","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,4]]},"reference":[{"issue":"no.4","key":"13_CR1","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/30.267415","volume":"39","author":"G. L. Friedman","year":"1993","unstructured":"G. L. Friedman: The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image, IEEE Trans. on Consumer Electronics, vol. 39, no.4, 1993, pp. 905\u2013910.","journal-title":"IEEE Trans. on Consumer Electronics"},{"key":"13_CR2","unstructured":"L. C. Guillou, M. Ugon and J.-J. Quisquater, The Smart Card: A Standardized Security Device Dedicated to Public Cryptology in Gus J. Simmons (Editor) Contemporary cryptology. The science of information integrity, IEEE Press, 1992, pp. 561\u2013613."},{"issue":"no.3","key":"13_CR3","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TIT.1977.1055709","volume":"23","author":"M. E. Hellman","year":"1977","unstructured":"M. E. Hellman: An extension of the Shannon Theory Approach to Cryptography, IEEE Trans. on Information Theory, vol 23, no.3, May 1977, pp. 289\u2013294.","journal-title":"IEEE Trans. on Information Theory"},{"key":"13_CR4","unstructured":"N. Koike, T. Matsumoto and H. Imai: A Scheme for Copyright Protection of Digital Images, SCIS93 (The 1993 Symp. on Cryptography and Information Security, Shuzenji, Japan, January 1993, paper 13C (in Japanese)."},{"issue":"no1","key":"13_CR5","first-page":"179","volume":"1","author":"B. Macq","year":"1994","unstructured":"B. Macq and J.-J. Quisquater: Digital Images Multiresolution Encryption, The Journal of the Interactive Multimedia Association Intellectual Property Project, vol. 1, no 1, pp. 179\u2013186, January 1994.","journal-title":"The Journal of the Interactive Multimedia Association Intellectual Property Project"},{"issue":"no1","key":"13_CR6","first-page":"187","volume":"1","author":"K. Matsui","year":"1994","unstructured":"K. Matsui and K. Tanaka: How to Secretly Embed a Signature in a Picture, The Journal of the Interactive Multimedia Association Intellectual Property Project, vol. 1, no 1, pp. 187\u2013206, January 1994.","journal-title":"The Journal of the Interactive Multimedia Association Intellectual Property Project"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"W. J. Mitchell: When Is Seeing Believing?, Scientific American, February 1994, pp. 44\u201349.","DOI":"10.1038\/scientificamerican0294-68"},{"key":"13_CR8","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/PROC.1977.10515","volume":"65","author":"A.N. Netravali","year":"1977","unstructured":"A.N. Netravali and B. Prasada, Adaptive quantization of picture signals using spatial masking, Proc. of IEEE, vol. 65, 1977, pp. 536\u2013548 1990, pp. 387\u2013394.","journal-title":"Proc. of IEEE"},{"issue":"no4","key":"13_CR9","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon: Communication Theory of Secret Systems, Bell System Technical Journal, vol 28, no 4, 1949, pp. 656\u2013715.","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Teleservices and Multimedia Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61028-6_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:28:43Z","timestamp":1619573323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61028-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540610281","9783540498490"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-61028-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}