{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:23:15Z","timestamp":1742916195468,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_27","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"463-479","source":"Crossref","is-referenced-by-count":2,"title":["Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking Schemes"],"prefix":"10.1007","author":[{"given":"Toshanlal","family":"Meenpal","sequence":"first","affiliation":[]},{"given":"A. K.","family":"Bhattacharjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"issue":"2","key":"27_CR1","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TSP.2004.839909","volume":"53","author":"A Abrardo","year":"2005","unstructured":"Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Trans. Signal Process. 53(2), 824\u2013833 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"27_CR2","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/TIFS.2012.2188797","volume":"7","author":"C Wang","year":"2012","unstructured":"Wang, C., Ni, J., Huang, J.: An informed watermarking scheme using hidden Markov model in the wavelet domain. IEEE Trans. Inf. Forensics Secur. 7(3), 853\u2013867 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/3-540-48910-X_10","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"F Ergun","year":"1999","unstructured":"Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140\u2013149. Springer, Heidelberg (1999)"},{"key":"27_CR4","unstructured":"Petitcolas, F.A.P., Anderson, R.J.: Evaluation of copyright marking systems. In: IEEE Multimedia Systems, Florence, Italy (1999)"},{"issue":"1","key":"27_CR5","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/83.892451","volume":"10","author":"GC Langelaar","year":"2001","unstructured":"Langelaar, G.C., Lagendijk, R.L.: Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process. 10(1), 148\u2013158 (2001)","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"27_CR6","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"27_CR7","unstructured":"Image Databases. \n                      http:\/\/www.imageprocessingplace.com\/root_files_V3\/image_databases.htm"},{"issue":"6","key":"27_CR8","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TIP.2003.821551","volume":"13","author":"ML Miller","year":"2004","unstructured":"Miller, M.L., Doerr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Process. 13(6), 792\u2013807 (2004)","journal-title":"IEEE Trans. Image Process."},{"volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","key":"27_CR9","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwell (2000)"},{"issue":"4","key":"27_CR10","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/LSP.2004.824028","volume":"11","author":"TK Das","year":"2004","unstructured":"Das, T.K., Maitra, S.: Cryptanalysis of correlation based watermarking scheme using single watermarked copy. IEEE Signal Process. Lett. 11(4), 446\u2013449 (2004)","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1109\/TSP.2004.839930","volume":"53","author":"TK Das","year":"2005","unstructured":"Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Trans. Signal Process. 53(2), 768\u2013775 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"27_CR12","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TMM.2006.870718","volume":"8","author":"TK Das","year":"2006","unstructured":"Das, T.K., Maitra, S., Zhou, J.: Cryptanalysis of Chu\u2019s DCT based watermarking scheme. IEEE Trans. Multimedia 8(3), 629\u2013632 (2006)","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"27_CR13","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/LSP.2008.2010808","volume":"16","author":"X Xiaotian","year":"2009","unstructured":"Xiaotian, X., Guan, Y.L., Teh, K.C.: Performance analysis of binned orthogonal\/bi-orthogonal block code as dirty-paper code for digital watermarking application. IEEE Signal Process. Lett. 16(3), 208\u2013211 (2009)","journal-title":"IEEE Signal Process. Lett."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:49:38Z","timestamp":1559332178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}