{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:47:07Z","timestamp":1743011227837,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319193205"},{"type":"electronic","value":"9783319193212"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19321-2_30","type":"book-chapter","created":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T17:20:34Z","timestamp":1432747234000},"page":"399-409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improved Spread Transform Dither Modulation: A New Modulation Technique for Secure Watermarking"],"prefix":"10.1007","author":[{"given":"Jian","family":"Cao","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,28]]},"reference":[{"issue":"1","key":"30_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TIFS.2008.2009603","volume":"4","author":"L P\u00e9rez-Freire","year":"2009","unstructured":"P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F.: Spread-spectrum watermarking security. IEEE Trans. Inf. Forensics Secur. 4(1), 2\u201324 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"30_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2007.916006","volume":"3","author":"F Cayre","year":"2008","unstructured":"Cayre, F., Bas, P.: Kerckhoffs-based embedding security classes for WOA data hiding. IEEE Trans. Inf. Forensics Secur. 3(1), 1\u201315 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"30_CR3","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F Cayre","year":"2005","unstructured":"Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Trans. Signal Process. 53(10), 3976\u20133987 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"12","key":"30_CR4","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"30_CR5","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"HS Malvar","year":"2003","unstructured":"Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898\u2013905 (2003)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"30_CR6","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/72.761722","volume":"10","author":"A Hyvarinen","year":"1999","unstructured":"Hyvarinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Trans. Neural Netw. 10(3), 626\u2013634 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"4","key":"30_CR7","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TIFS.2006.885029","volume":"1","author":"L P\u00e9rez-Freire","year":"2006","unstructured":"P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F., Furon, T., Comesana, P.: Security of lattice based data hiding against the known message attack. IEEE Trans. Inf. Forensics Secur. 1(4), 421\u2013439 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory 47, 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/11558859_11","volume-title":"Information Hiding","author":"L P\u00e9rez-Freire","year":"2005","unstructured":"P\u00e9rez-Freire, L., Comesa\u00f1a, P., P\u00e9rez-Gonz\u00e1lez, F.: Information-theoretic analysis of security in side-informed data hiding. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 131\u2013145. Springer, Heidelberg (2005)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Bas, P., Cayre, F.: Achieving subspace or key security for woa using natural or circular watermarking. In: Proceedings of the 8th ACM Workshop on Multimedia and Security (MM&Sec 2006), Geneva, Switzerland, pp. 80\u201388, September 2006","DOI":"10.1145\/1161366.1161381"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-74124-4_1","volume-title":"Information Hiding","author":"P Bas","year":"2007","unstructured":"Bas, P., Cayre, F.: Natural watermarking: a secure spread spectrum technique for WOA. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 1\u201314. Springer, Heidelberg (2007)"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1109\/5.771068","volume":"87","author":"I Cox","year":"1999","unstructured":"Cox, I., Miller, M., McKellips, A.: Watermarking as communications with side information. Proc. IEEE 87, 1127\u20131141 (1999)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19321-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T04:06:57Z","timestamp":1675138017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19321-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319193205","9783319193212"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19321-2_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}