{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:28:34Z","timestamp":1753601314124,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319193205"},{"type":"electronic","value":"9783319193212"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19321-2_14","type":"book-chapter","created":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T17:20:34Z","timestamp":1432747234000},"page":"187-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack"],"prefix":"10.1007","author":[{"given":"Jianfeng","family":"Lu","sequence":"first","affiliation":[]},{"given":"Qianru","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Junping","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,28]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1155\/S1110865702000525","volume":"2","author":"IJ Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. EURASIP J. Appl. Sig. Process. 2, 126\u2013132 (2002)","journal-title":"EURASIP J. Appl. Sig. Process."},{"issue":"2","key":"14_CR2","first-page":"214","volume":"31","author":"Q Wen","year":"2003","unstructured":"Wen, Q., Sun, T.F., Wang, S.X.: Concept and application of zero-watermark. Acta Electronica Sinica. 31(2), 214\u2013216 (2003)","journal-title":"Acta Electronica Sinica."},{"issue":"2","key":"14_CR3","first-page":"464","volume":"34","author":"JK Kou","year":"2013","unstructured":"Kou, J.K., Wei, L.X.: Zero-watermarking algorithm based on piecewise logistic chaotic map. Comput. Eng. Des. 34(2), 464\u2013468 (2013)","journal-title":"Comput. Eng. Des."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Shi, J., Yan, Q., Shi, H., Wang, Y.: Visual attention based image zero watermark scheme with ensemble similarity. In: 2013 IEEE International Conference on Wireless Communications and Signal Processing (WCSP), pp. 1\u20135 (2013)","DOI":"10.1109\/WCSP.2013.6677143"},{"issue":"2","key":"14_CR5","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/S1005-8885(10)60050-7","volume":"18","author":"GY Gao","year":"2011","unstructured":"Gao, G.Y., Jiang, G.P.: Zero-bit watermarking resisting geometric attacks based on composite-chaos optimized SVR model. J. China Univ. Posts Telecommun. 18(2), 94\u2013101 (2011)","journal-title":"J. China Univ. Posts Telecommun."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Rublee, E., Rabaud, V., Konolige, K., Bradski, G.: ORB: an efficient alternative to SIFT or SURF. In: 2011 IEEE International Conference on Proceedings of Computer Vision (ICCV), pp. 2564\u20132571 (2011)","DOI":"10.1109\/ICCV.2011.6126544"},{"issue":"60","key":"14_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"2","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Proc. IJCV. 2(60), 91\u2013110 (2004)","journal-title":"Proc. IJCV."},{"issue":"6","key":"14_CR8","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM. 24(6), 381\u2013395 (1981)","journal-title":"Commun. ACM."},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/11744023_34","volume-title":"Computer Vision \u2013 ECCV 2006","author":"E Rosten","year":"2006","unstructured":"Rosten, E., Drummond, T.W.: Machine learning for high-speed corner detection. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part I. LNCS, vol. 3951, pp. 430\u2013443. Springer, Heidelberg (2006)"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TPAMI.2008.275","volume":"32","author":"E Rosten","year":"2010","unstructured":"Rosten, E., Porter, R., Drummond, T.: Faster and better: a machine learning approach to corner detection. IEEE Trans. Pattern Anal. Mach. Intell. 32(1), 105\u2013119 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"14_CR11","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1006\/cviu.1998.0719","volume":"73","author":"PL Rosin","year":"1999","unstructured":"Rosin, P.L.: Measuring corner properties. Comput. Vis. Image Underst. 73(2), 291\u2013307 (1999)","journal-title":"Comput. Vis. Image Underst."},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1007\/978-3-642-15561-1_56","volume-title":"Computer Vision \u2013 ECCV 2010","author":"M Calonder","year":"2010","unstructured":"Calonder, M., Lepetit, V., Strecha, C., Fua, P.: BRIEF: binary robust independent elementary features. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010, Part IV. LNCS, vol. 6314, pp. 778\u2013792. Springer, Heidelberg (2010)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Chandrasekhar, V. R., Chen, D. M., Tsai, S. S., Cheung, N. M., Chen, H., Takacs, G., Girod, B.: The stanford mobile visual search data set. In: Proceedings of the second annual ACM Conference on Multimedia Systems, pp. 117\u2013122 (2011)","DOI":"10.1145\/1943552.1943568"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19321-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T03:44:34Z","timestamp":1748403874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19321-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319193205","9783319193212"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19321-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}