{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:56:45Z","timestamp":1772283405854,"version":"3.50.1"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319123240","type":"print"},{"value":"9783319123257","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12325-7_12","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T12:36:48Z","timestamp":1416573408000},"page":"134-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Families of 3D Arrays for Video Watermarking"],"prefix":"10.1007","author":[{"given":"Sam","family":"Blake","sequence":"first","affiliation":[]},{"given":"Oscar","family":"Moreno","sequence":"additional","affiliation":[]},{"given":"Andrew Z.","family":"Tirkel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"12_CR1","unstructured":"Tirkel, A.Z., Rankin, G.A., van Schyndel, R.M., Ho, W.J., Mee, N.R.A., Osborne, C.F.: Electronic water mark. In: DICTA 93, pp. 666\u2013673, Macquarie University (1993)"},{"key":"12_CR2","unstructured":"Tirkel, A.Z., Osborne, C.F., Hall, T.E.: Steganography - applications of coding theory. In: IEEE - IT Workshop, pp. 57\u201359, Svalbard, Norway (1997)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Tirkel, A.Z., Hall, T.E.: Array construction using cyclic shifts of a column. In: ISIT\u201905, pp. 2050\u20132054 (2005)","DOI":"10.1109\/ISIT.2005.1523706"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-30615-0_20","volume-title":"Sequences and Their Applications \u2013 SETA 2012","author":"O Moreno","year":"2012","unstructured":"Moreno, O., Tirkel, A.: New optimal low correlation sequences for wireless communications. In: Helleseth, T., Jedwab, J. (eds.) SETA 2012. LNCS, vol. 7280, pp. 212\u2013223. Springer, Heidelberg (2012)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Moreno, O., Maric, S.: A class of frequency hop codes with nearly ideal characteristics for multiple-target recognition. In: ISIT, p. 126 (1997)","DOI":"10.1109\/ISIT.1997.613041"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-540-77404-4_8","volume-title":"Sequences, Subsequences, and Consequences","author":"O Moreno","year":"2007","unstructured":"Moreno, O., Ortiz-Ubarri, J.: Double periodic arrays with optimal correlation for applications in watermarking. In: Golomb, S.W., Gong, G., Helleseth, T., Song, H.-Y. (eds.) SSC 2007. LNCS, vol. 4893, pp. 82\u201394. Springer, Heidelberg (2007)"},{"issue":"1","key":"12_CR7","first-page":"12","volume":"5","author":"VM Sidelnikov","year":"1969","unstructured":"Sidelnikov, V.M.: Some k-valued pseudo-random sequences and nearly equidistant codes. Probl. Inf. Transm. 5(1), 12\u201316 (1969)","journal-title":"Probl. Inf. Transm."},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0165-1684(93)90047-E","volume":"30","author":"L Bomer","year":"1993","unstructured":"Bomer, L., Antweiler, M.: Optimizing the aperiodic merit factor of binary arrays. Signal Process. (Elsevier) 30, 1\u201313 (1993)","journal-title":"Signal Process. (Elsevier)"},{"key":"12_CR9","unstructured":"Digital Watermarking PCT\/AU2010\/000990, WO2011\/050390, US 2012213402, EP2494516, AU2010312302"},{"key":"12_CR10","unstructured":"Digital Communications AU 2011904698, PCT\/AU2012\/001377"},{"key":"12_CR11","unstructured":"Algebraic Generators of Sequences for Communication Signals AU2011905002, PCT\/AU2012\/001473"}],"container-title":["Lecture Notes in Computer Science","Sequences and Their Applications - SETA 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12325-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T20:10:59Z","timestamp":1747167059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12325-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123240","9783319123257"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12325-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}