{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:27:15Z","timestamp":1725852435133},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_33","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T04:15:28Z","timestamp":1459311328000},"page":"406-417","source":"Crossref","is-referenced-by-count":0,"title":["Robust Content-Based Image Hash Functions Using Nested Lattice Codes"],"prefix":"10.1007","author":[{"given":"Thanh Xuan","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Ricardo A. Parrao","family":"Hernandez","sequence":"additional","affiliation":[]},{"given":"Brian M.","family":"Kurkoski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"3","key":"33_CR2","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0262-8856(97)00062-0","volume":"16","author":"C-L Huang","year":"1998","unstructured":"Huang, C.-L., Huang, D.-H.: A content-based image retrieval system. Image Vis. Comput. 16(3), 149\u2013163 (1998)","journal-title":"Image Vis. Comput."},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-57301-1_5","volume-title":"Foundations of Data Organization and Algorithms","author":"R Agrawal","year":"1993","unstructured":"Agrawal, R., Faloutsos, C., Swami, A.: Efficient similarity search in sequence databases. In: Lomet, D.B. (ed.) FODO 1993. LNCS, vol. 730, pp. 69\u201384. Springer, Heidelberg (1993)"},{"key":"33_CR4","unstructured":"Venkatesan, R., et al.: Robust image hashing. In: Proceedings, 2000 International Conference on Image Processing, vol. 3. IEEE (2000)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Hernandez, R.A.P., Miyatake, M.N., Kurkoski, B.M.: Robust image hashing using image normalization and SVD decomposition. In: 2011 IEEE 54th Midwest Symposium on MWSCAS. IEEE (2011)","DOI":"10.1109\/MWSCAS.2011.6026372"},{"issue":"10","key":"33_CR6","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1109\/32.6184","volume":"14","author":"C Faloutsos","year":"1988","unstructured":"Faloutsos, C.: Gray codes for partial match and range queries. IEEE Trans. Softw. Eng. 14(10), 1381\u20131393 (1988)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"33_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TIFS.2009.2038742","volume":"5","author":"Z Guopu","year":"2010","unstructured":"Guopu, Z., et al.: Fragility analysis of adaptive quantization-based image hashing. IEEE Trans. Inf. Forensics Secur. 5(1), 133\u2013147 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TIP.2012.2201489","volume":"21","author":"Y Li","year":"2012","unstructured":"Li, Y., et al.: Robust image hashing based on random Gabor filtering and dithered lattice vector quantization. IEEE Trans. Image Process. 21, 1963\u20131980 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"33_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6568-7","volume-title":"Sphere Packings, Lattices and Groups","author":"JH Conway","year":"1999","unstructured":"Conway, J.H., Sloane, N.J.A.: Sphere Packings, Lattices and Groups, 3rd edn. Springer, New York (1999)","edition":"3"},{"issue":"2","key":"33_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1984.1162229","volume":"1","author":"RM Gray","year":"1984","unstructured":"Gray, R.M.: Vector quantization. IEEE ASSP Mag. 1(2), 4\u201329 (1984)","journal-title":"IEEE ASSP Mag."},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11744023_32","volume-title":"Computer Vision \u2013 ECCV 2006","author":"H Bay","year":"2006","unstructured":"Bay, H., Tuytelaars, T., Van Gool, L.: SURF: speeded up robust features. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part I. LNCS, vol. 3951, pp. 404\u2013417. Springer, Heidelberg (2006)"},{"key":"33_CR12","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1109\/TIT.1983.1056761","volume":"IT\u201329","author":"JH Conway","year":"1983","unstructured":"Conway, J.H., Sloane, N.J.A.: A fast encoding method for lattice codes and quantizers. IEEE Trans. Inf. Theory IT\u201329, 820\u2013824 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"33_CR13","unstructured":"Gray, F.: Pulse code communication. U.S. Patent, 17 March 1953"},{"issue":"2","key":"33_CR14","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29(2), 147\u2013160 (1950)","journal-title":"Bell Syst. Tech. J."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:51:52Z","timestamp":1559415112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}