{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:26:59Z","timestamp":1725852419840},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_15","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T04:15:28Z","timestamp":1459311328000},"page":"176-190","source":"Crossref","is-referenced-by-count":0,"title":["Image Watermarking Based on Reflectance Modification"],"prefix":"10.1007","author":[{"given":"Piyanart","family":"Chotikawanid","sequence":"first","affiliation":[]},{"given":"Thumrongrat","family":"Amornraksa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"15_CR1","volume-title":"Digital Watermarking and Steganography: Fundamental and Techniques","author":"FY Shin","year":"2007","unstructured":"Shin, F.Y.: Digital Watermarking and Steganography: Fundamental and Techniques. CRC Press, Boca Raton (2007)"},{"issue":"6","key":"15_CR2","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1109\/TIP.2013.2253474","volume":"22","author":"Z Peijia","year":"2013","unstructured":"Peijia, Z., Jiwu, H.: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process. 22(6), 2455\u20132468 (2013)","journal-title":"IEEE Trans. Image Process."},{"doi-asserted-by":"crossref","unstructured":"Thongkor, K., Mettripun, N., Pramoun, T., Amornraksa, T.: Image watermarking based on DWT coefficients modification for social networking services. In: Proceedings of ECTI-CON 2013, Krabi, Thailand, 15\u201317 May 2013","key":"15_CR3","DOI":"10.1109\/ECTICon.2013.6559626"},{"unstructured":"Qianli, Y., Cai, Y.: A digital image watermarking algorithm based on discrete wavelet transform and discrete cosine transform. In: Proceedings of ITME 2012, Hokkaido, Japan, 3\u20135 August 2012","key":"15_CR4"},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MMUL.2014.14","volume":"21","author":"LJ San","year":"2014","unstructured":"San, L.J., Bo, L.: Self-recognized image protection technique that resists large-scale cropping. IEEE Trans. Multimedia 21(1), 60\u201373 (2014)","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"15_CR6","doi-asserted-by":"publisher","first-page":"033009-1","DOI":"10.1117\/1.JEI.22.3.033009","volume":"22","author":"N Mettripun","year":"2013","unstructured":"Mettripun, N., Amornraksa, T., Delp, E.J.: Robust image watermarking based on luminance modification. J. Electron. Imaging 22(3), 033009-1\u2013033009-15 (2013)","journal-title":"J. Electron. Imaging"},{"issue":"3","key":"15_CR7","doi-asserted-by":"publisher","first-page":"033009-1","DOI":"10.1117\/1.JEI.23.3.033009","volume":"23","author":"S Tachaphetpiboon","year":"2014","unstructured":"Tachaphetpiboon, S., Thongkor, K., Amornraksa, T., Delp, E.J.: Digital watermarking for color images in hue-saturation-value color space. J. Electron. Imaging 23(3), 033009-1\u2013033009-14 (2014)","journal-title":"J. Electron. Imaging"},{"issue":"2","key":"15_CR8","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1117\/1.482648","volume":"7","author":"M Kutter","year":"1998","unstructured":"Kutter, M., Jordan, F., Bossen, F.: Digital signature of colour images using amplitude modulation. J. Electron. Imaging 7(2), 326\u2013332 (1998)","journal-title":"J. Electron. Imaging"},{"issue":"2","key":"15_CR9","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.imavis.2005.09.018","volume":"24","author":"T Amornraksa","year":"2006","unstructured":"Amornraksa, T., Janthawongwilai, K.: Enhanced images watermarking based on amplitude modulation. Image Vis. Comput. 24(2), 111\u2013119 (2006)","journal-title":"Image Vis. Comput."},{"issue":"6","key":"15_CR10","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.jvcir.2009.03.009","volume":"20","author":"CH Lai","year":"2009","unstructured":"Lai, C.H., Wu, J.L.: Robust image watermarking against local geometric attacks using multiscale block matching method. J. Vis. Commun. Image 20(6), 377\u2013388 (2009)","journal-title":"J. Vis. Commun. Image"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-319-19321-2_7","volume-title":"Digital-Forensics and Watermarking","author":"H Miao","year":"2015","unstructured":"Miao, H., Lin, Y.-H., Wu, J.-L.: Image descriptor based digital semi-blind watermarking for DIBR 3D images. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 90\u2013104. Springer, Heidelberg (2015)"},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s11045-013-0257-0","volume":"26","author":"X He","year":"2015","unstructured":"He, X., Zhu, T., Yang, G.: A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimension. Syst. Signal Process. 26(1), 291\u2013306 (2015)","journal-title":"Multidimension. Syst. Signal Process."},{"issue":"6","key":"15_CR13","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1016\/j.ipm.2014.07.001","volume":"50","author":"HA Abdallah","year":"2014","unstructured":"Abdallah, H.A., et al.: Homomorphic image watermarking with a singular value decomposition algorithm. Info. Process. Manage. 50(6), 909\u2013923 (2014)","journal-title":"Info. Process. Manage."},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"L Ruizhen","year":"2002","unstructured":"Ruizhen, L., Tieniu, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 4(1), 121\u2013128 (2002)","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"15_CR15","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TMM.2005.843357","volume":"7","author":"ZX Ping","year":"2005","unstructured":"Ping, Z.X., Kan, L.: Comments on An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 7(3), 593\u2013594 (2005)","journal-title":"IEEE Trans. Multimedia"},{"key":"15_CR16","volume-title":"Digital image processing","author":"RC Gonzalez","year":"2010","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital image processing, 3rd edn. Prentice Hall Inc., New Jersey (2010)","edition":"3"},{"key":"15_CR17","volume-title":"Image Encryption: A Communication perspective","author":"E Fathi","year":"2013","unstructured":"Fathi, E., et al.: Image Encryption: A Communication perspective. CRC Press, Boca Raton (2013)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-92238-4_23","volume-title":"Digital Watermarking","author":"G Boato","year":"2008","unstructured":"Boato, G., Conotter, V., De Natale, F.G.B.: GA-based robustness evaluation method for digital image watermarking. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 294\u2013307. Springer, Heidelberg (2008)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-19321-2_10","volume-title":"Digital-Forensics and Watermarking","author":"F-M Tsai","year":"2015","unstructured":"Tsai, F.-M., Hsue, W.-L.: Image watermarking based on various discrete fractional fourier transforms. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 135\u2013144. Springer, Heidelberg (2015)"},{"issue":"5","key":"15_CR20","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/79.879339","volume":"17","author":"FAP Petitcolas","year":"2000","unstructured":"Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. 17(5), 58\u201364 (2000)","journal-title":"IEEE Signal Process."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:41:30Z","timestamp":1559414490000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}