{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:27:05Z","timestamp":1725852425734},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_23","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T04:15:28Z","timestamp":1459311328000},"page":"271-284","source":"Crossref","is-referenced-by-count":3,"title":["DCT-OFDM Based Watermarking Scheme Robust Against Clipping, Rotation, and Scaling Attacks"],"prefix":"10.1007","author":[{"given":"Hiroaki","family":"Ogawa","sequence":"first","affiliation":[]},{"given":"Minoru","family":"Kuribayashi","sequence":"additional","affiliation":[]},{"given":"Motoi","family":"Iwata","sequence":"additional","affiliation":[]},{"given":"Koichi","family":"Kise","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"23_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"FAP Petitcolas","year":"1998","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 98. LNCS, vol. 1525, pp. 219\u2013239. Springer, Heidelberg (1998)"},{"issue":"5","key":"23_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/79.879339","volume":"17","author":"FAP Petitcolas","year":"2000","unstructured":"Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Trans. Signal Process. 17(5), 58\u201364 (2000)","journal-title":"IEEE Trans. Signal Process."},{"key":"23_CR3","unstructured":"IHC Committee. IHC Evaluation Criteria and Competition. \n                      http:\/\/www.ieice.org\/iss\/emm\/ihc\/IHC_criteriaVer4.pdf"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Hakka, M., Kuribayashi, M., Morii, M.: DCT-OFDM based watermarking scheme robust against clipping attack. In: Proceedings of IWIHC 2014, pp. 18\u201324 (2014)","DOI":"10.1145\/2598908.2598914"},{"issue":"12","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I Cox","year":"1997","unstructured":"Cox, I., Kilian, J., Leighton, F., Shamson, T.: Secure spreadspectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"23_CR6","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"HS Malvar","year":"2003","unstructured":"Malvar, H.S., Flor\u00eancio, D.A.F.: Improved spreadspectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898\u2013905 (2003)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"23_CR7","first-page":"154","volume":"14","author":"RG Maximal","year":"1968","unstructured":"Maximal, R.G.: Recursive sequences with 3-valued recursivecross-correlation functions. IEEE Trans. Inf. Theor. 14(3), 154\u2013156 (1968)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"23_CR8","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TIT.1967.1054010","volume":"13","author":"AJ Viterbi","year":"1967","unstructured":"Viterbi, A.J.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans. Inf. Theor. 13(2), 260\u2013269 (1967)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"23_CR9","unstructured":"Siozaki, A.: Basis of Information and Coding Theory. Ohmsha, Ltd. (2011)"},{"key":"23_CR10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low Density Parity Check Codes","author":"RG Gallager","year":"1963","unstructured":"Gallager, R.G.: Low Density Parity Check Codes. M.I.T. Press, Cambridge (1963)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Hirata, N., Kawamura, M.: Digital watermarking method using LDPC code for clipped image. In: Proceedings of IWIHC 2014, pp. 25\u201330. ACM (2014)","DOI":"10.1145\/2598908.2598913"},{"issue":"4","key":"23_CR12","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: aclass of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theor. 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theor."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T19:16:51Z","timestamp":1559416611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}