{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:27:08Z","timestamp":1742912828239,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319219776"},{"type":"electronic","value":"9783319219783"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21978-3_5","type":"book-chapter","created":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T04:57:32Z","timestamp":1438577852000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Digital Watermarking Algorithm for Trademarks Based on U System"],"prefix":"10.1007","author":[{"given":"Chuguang","family":"Li","sequence":"first","affiliation":[]},{"given":"Ben","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Junhao","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Zhanchuan","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,4]]},"reference":[{"issue":"3\u20134","key":"5_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM Syst. J. 35(3\u20134), 313\u2013336 (1996)","journal-title":"IBM Syst. J."},{"issue":"6","key":"5_CR2","first-page":"16","volume":"37","author":"E Sapwater","year":"1994","unstructured":"Sapwater, E., Wood, K.: Electronic copyright protection. Photo-Electron. Imaging 37(6), 16\u201321 (1994)","journal-title":"Photo-Electron. Imaging"},{"key":"5_CR3","unstructured":"Lin, C.Y., Chang, S.F.: Distortion modeling and invariant extraction for digital image print-scan process. In: International Symposium on Multimedia Information Processing (ISMIP 1999), Taipei, Taiwan, December 1999"},{"key":"5_CR4","unstructured":"Lin, C.Y.: Public watermarking surviving general scaling and cropping: an application for print-and-scan process. In: Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, October 1999"},{"key":"5_CR5","unstructured":"Li, Z., Fu, Z.: Printing image information implied [conference papers] (2000)"},{"key":"5_CR6","unstructured":"Chongxiong, Z.: Design and realization of detecting instrument for digital watermark trademark based on ARM. In: 2011 10th International Conference on Electronic Measurement and Instruments (ICEMI), vol. 3 (2011)"},{"key":"5_CR7","first-page":"21","volume":"2","author":"Q Dongxu","year":"1984","unstructured":"Dongxu, Q., Yuyu, F.: About orthogonal complete system. J. Jilin Univ. Nat. Sci. 2, 21\u201330 (1984)","journal-title":"J. Jilin Univ. Nat. Sci."},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"CT Hsu","year":"1999","unstructured":"Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. Image Process. 8, 58\u201368 (1999)","journal-title":"IEEE Trans. Image Process."},{"key":"5_CR9","unstructured":"Qi, D.X., Ding, W., Li, H.S.: A new image transformation scheme and digital approximation between different pictures (1999)"},{"key":"5_CR10","unstructured":"Qi, D.X., Ding, W., Li, H.S.: Tangram algorithm: image transformation for storing and transmitting visual secrets (1997)"},{"key":"5_CR11","unstructured":"Gupta, P.: Cryptography based digital image watermarking algorithm to increase security of watermark data. Int. J. Sci. Eng. Res. 3(9) (2012)"},{"key":"5_CR12","unstructured":"Ma, H., Song, R., Wang, X., Qi, D.: Journal of V descriptors and B spline curve\u00a0[J] Computer Aided Design and Computer Graphics, 18(11) (2006)"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/978-81-322-2250-7_74","volume":"339","author":"S Som","year":"2015","unstructured":"Som, S., Mahapatra, S., Sen, S.: A no reference image authentication scheme based on digital watermark information systems design and intelligent applications. Adv. Intell. Syst. Comput. 339, 741\u2013749 (2015)","journal-title":"Adv. Intell. Syst. Comput."}],"container-title":["Lecture Notes in Computer Science","Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21978-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T12:29:58Z","timestamp":1564403398000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-21978-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319219776","9783319219783"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21978-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}