{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:41:14Z","timestamp":1725795674306},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079974"},{"type":"electronic","value":"9783319079981"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07998-1_32","type":"book-chapter","created":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T21:27:22Z","timestamp":1401917242000},"page":"280-288","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation of a Fourier Watermarking Method Robustness to Cards Durability Attacks"],"prefix":"10.1007","author":[{"given":"Rabia","family":"Riad","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"El Hajji","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Douzi","sequence":"additional","affiliation":[]},{"given":"Rachid","family":"Harba","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Ros","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Ros, F., Borla, J., Leclerc, F., Harba, R., Launay, N.: An industrial watermarking process for plastic card supports. In: Proc. IEEE ICIT, pp. 2809\u20132814 (2006)","DOI":"10.1109\/ICIT.2006.372635"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Picard, J., Vielhauer, C., Thorwirth, N.: Towards fraud-proof ID documents using multiple data hiding technologies and biometrics. In: Proc. SPIE, vol.\u00a0416, pp. 416\u2013427 (2004)","DOI":"10.1117\/12.525446"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography, 2nd edn. Morgan Kaufmann (2007)","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"El Hajji, M., Douzi, H., Harba, R., Mammass, D., Ros, F.: New image watermarking algorithm based on mixed scales wavelets. JEI -SPIE\u00a021, 13003-1\u201313003-7 (2012)","DOI":"10.1117\/1.JEI.21.1.013003"},{"key":"32_CR5","unstructured":"Fogra: The Fogra testing laboratory for ID-cards and passport documents, \n                    \n                      www.fogra.org"},{"key":"32_CR6","unstructured":"Datacard Group: Durability of Smart Cards for Government eID. Part of a series of Datacard Group white papers for the secure document issuer"},{"key":"32_CR7","unstructured":"Karppinen, K., Dequidt, M.: Smart card interfaces and government applications. White paper, Gemalto Government Programs 06\/08 (2008)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Riad, R., Harba, R., Douzi, H., Elhajji, M., Ros, F.: Print-and-scan counterattacks for plastic card supports Fourier watermarking. Accepted to IEEE Industrial Electronic Symposium in Istambul (2014)","DOI":"10.1109\/ISIE.2014.6864755"},{"key":"32_CR9","unstructured":"Bailey, D.G.: A new approach to lens distortion correction. In: Proc. Image and Vision Computing, pp. 59\u201364 (2002)"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/83.967401","volume":"10","author":"V. Solachidis","year":"2001","unstructured":"Solachidis, V., Pitas, I.: Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Transactions on Image Processing\u00a010, 1741\u20131753 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Poljicak, A., Mandic, L., Agic, D.: Discrete Fourier transform-based watermarking method with an optimal implementation radius. J. Electron. Imaging\u00a020(3), 033008-1\u2013033008-8 (2011)","DOI":"10.1117\/1.3609010"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A. Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Kevitt, M.: Digital image steganography suvey and analysis of current methods. Signal Processing\u00a090, 727\u2013752 (2010)","journal-title":"Signal Processing"},{"key":"32_CR13","unstructured":"Nakamura, S.: Applied Numerical Methods in C. Prentice Hall (1995)"},{"key":"32_CR14","unstructured":"database: PICS (Psychological Image Collection at Stirling) - Aberdeen (2012)"}],"container-title":["Lecture Notes in Computer Science","Image and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07998-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:22:51Z","timestamp":1558916571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07998-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079974","9783319079981"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07998-1_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}