{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T23:10:02Z","timestamp":1749683402870,"version":"3.41.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_11","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T03:53:29Z","timestamp":1477886009000},"page":"114-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Schur Decomposition Based Robust Watermarking Algorithm in Contourlet Domain"],"prefix":"10.1007","author":[{"given":"Junxiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ying","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"12","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079\u20131107 (1999)","journal-title":"Proc. IEEE"},{"issue":"8","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1016\/j.sigpro.2011.03.001","volume":"91","author":"BY Lei","year":"2011","unstructured":"Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973\u20131984 (2011)","journal-title":"Sig. Process."},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.sigpro.2013.06.025","volume":"94","author":"Q Su","year":"2014","unstructured":"Su, Q., Niu, Y.G., Wang, G., Jia, S.L., Yue, J.: Color image blind watermarking scheme based on QR decomposition. Sig. Process. 94, 219\u2013235 (2014)","journal-title":"Sig. Process."},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.sigpro.2013.07.024","volume":"94","author":"M Ali","year":"2014","unstructured":"Ali, M., Ahn, C.W.: An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain. Sig. Process. 94, 545\u2013556 (2014)","journal-title":"Sig. Process."},{"key":"11_CR6","first-page":"58","volume":"27","author":"MA Nematollahi","year":"2015","unstructured":"Nematollahi, M.A., Al-Haddad, S.A.R., Zarafshan, F.: Blind digital speech watermarking based on eigen-value quantization in DWT. Comput. Inf. Sci. 27, 58\u201367 (2015)","journal-title":"Comput. Inf. Sci."},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/s11760-014-0624-9","volume":"9","author":"M Agoyi","year":"2015","unstructured":"Agoyi, M., \u00c7elebi, E., Anbarjafari, G.: A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. SIViP 9(3), 735\u2013745 (2015)","journal-title":"SIViP"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s11771-011-0668-8","volume":"9","author":"W Song","year":"2011","unstructured":"Song, W., Hou, J.J., Li, Z.H., Huang, L.: Chaotic system and QR factorization based robust digital image watermarking algorithm. J. Cent. South Univ. Technol. 9(1), 116\u2013124 (2011)","journal-title":"J. Cent. South Univ. Technol."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Naderahmadian, Y., Hosseini-Khayat, S.: Fast watermarking based on QR decomposition in wavelet domain. In: 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), vol. 39, pp. 127\u2013130, October 2010","DOI":"10.1109\/IIHMSP.2010.39"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Liu, F., Han, K., Wang, C.Z.: A novel blind watermark algorithm based on SVD and DCT. In: IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 12, pp. 283\u2013286, November 2009","DOI":"10.1109\/ICICISYS.2009.5357687"},{"issue":"11","key":"11_CR11","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"CC Lai","year":"2010","unstructured":"Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060\u20133063 (2010)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"11_CR12","volume-title":"Franklin: Matrix theory","author":"N Joel","year":"2000","unstructured":"Joel, N.: Franklin: Matrix theory. Dover Publications, New York (2000)"},{"issue":"8","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"ZH Xia","year":"2014","unstructured":"Xia, Z.H., Wang, X.H., Sun, X.M., Wang, B.W.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283\u20131291 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"ZH Xia","year":"2016","unstructured":"Xia, Z.H., Wang, X.H., Sun, X.M., Liu, Q.S., Xiong, N.X.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947\u20131962 (2016)","journal-title":"Multimedia Tools Appl."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T22:37:05Z","timestamp":1749681425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}