{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:42:11Z","timestamp":1742956931677,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387747248"},{"type":"electronic","value":"9780387784144"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-78414-4_303","type":"book-chapter","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:22:44Z","timestamp":1221582164000},"page":"181-186","source":"Crossref","is-referenced-by-count":0,"title":["Digital Watermarking"],"prefix":"10.1007","author":[{"given":"Martin","family":"Steinebach","sequence":"first","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]},{"given":"Erich","family":"Neuhold","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"303_CR1_303","doi-asserted-by":"crossref","unstructured":"C.F. Osborne, R.G. van Schyndel, and A.Z. Tirkel, \u201cA Digital Watermark,\u201d IEEE International Conference on Image Processing, Austin, Texas, pp. 86\u201390, November 1994.","DOI":"10.1109\/ICIP.1994.413536"},{"key":"303_CR2_303","volume-title":"\u201cDigital Watermarking,\u201d","author":"M. Cox","year":"2002","unstructured":"M. Cox and B. Miller, \u201cDigital Watermarking,\u201d Academic Press, San Diego, USA, ISBN 1-55860-714-5, 2002."},{"key":"303_CR3_303","doi-asserted-by":"crossref","unstructured":"F.A.P. Petticolas and S. Katzenbeisser, \u201cInformation Hiding Techniques for Steganography and Digital Watermarking,\u201d Artech House Computer Security Series, 2000.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"issue":"No. 4","key":"303_CR4_303","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/93.959103","volume":"Vol. 8","author":"J. Dittmann","year":"2001","unstructured":"J. Dittmann, P. Wohlmacher, and K. Nahrstedt, \u201cMultimedia and Security \u2013 Using Cryptographic and Watermarking Algorithms,\u201d IEEE Multimedia, Vol. 8, No. 4, 2001, pp. 54\u201365.","journal-title":"IEEE Multimedia"},{"issue":"No. 6","key":"303_CR5_303","first-page":"971","volume":"Vol. 92","author":"A. Macq","year":"June 2004","unstructured":"A. Macq, J. Dittmann, and E.J. Delp, \u201cBenchmarking of Image Watermarking Algorithms for Digital Rights Management,\u201d Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management, Vol. 92, No. 6, June 2004, pp. 971\u2013984.","journal-title":"Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management"},{"key":"303_CR6_303","unstructured":"G. Fridrich et al., \u201cInvertile Authentication,\u201d In: P.W. Wong and E.J. Delp III (Eds.) \u201cSecurity and Watermarking of Multimedia Contents III,\u201d Proceedings of SPIE, Vol. 4314, 2001, pp. 197\u2013208."},{"key":"303_CR7_303","unstructured":"S. Katzenbeisser and J. Dittmann, \u201cMalicious attacks on media authentication schemes based on invertible watermarks,\u201d Proceedings of E.J. Delp III, P.W. Wong (Eds.): Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE, Vol. 5306, pp. 838\u2013847, Electronic Imaging Science and Technologies, San Jose, California, January 2004."},{"key":"303_CR8_303","unstructured":"M. Kutter, S. Voloshynovskiy, and A. Herrigel, \u201cWatermark Copy Attack,\u201d Proceedings of SPIE: Security and Watermarking of Multimedia Contents II, San Jose, California, USA, Vol. 3971, January 2000, pp. 371\u2013381."},{"key":"303_CR9_303","unstructured":"F.A.P. Petitcolas, M. Steinebach, J. Dittmann, C. Fontaine, F. Raynal, and N. Fat\u00e8s, \u201cA public automated web-based evaluation service for watermarking schemes: StirMark Benchmark,\u201d in P.W. Wong, E.J. Delp III (Eds.) Security and Watermarking of Multimedia Contents III, Proceedings of SPIE, Vol. 4314, 2001, pp. 575\u2013584."},{"key":"303_CR10_303","unstructured":"A. Lang, J. Dittmann, E. Lin, E.J. Delp III, \u201cApplication-oriented audio watermark benchmark service,\u201d Proceedings of E.J. Delp III, P.W. Wong (Eds.): Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, Vol. 5681, pp. 275\u2013286, Electronic Imaging Science and Technologies, San Jose, California, USA, January 2005."}],"container-title":["Encyclopedia of Multimedia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-78414-4_303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T23:16:25Z","timestamp":1738365385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-78414-4_303"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9780387747248","9780387784144"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-78414-4_303","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}