{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:51Z","timestamp":1725574431627},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_16","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T23:00:52Z","timestamp":1294354852000},"page":"212-222","source":"Crossref","is-referenced-by-count":0,"title":["A Feature-Watermarking Scheme for JPEG Image Authentication"],"prefix":"10.1007","author":[{"given":"Jinshen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Thiemert","sequence":"additional","affiliation":[]},{"given":"Zhiquan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Dai, Y., Thiemert, S., Steinbach, M., Hauer, E., Dittmann, J.: Featurebased watermarking scheme for MPEG-I\/II video authentication. In: Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, part of the IS&T\/SPIE Symposium on Electronic Imaging 2004, San Jose, CA USA, January 18-22 (2004) (has been accepted)","key":"16_CR1","DOI":"10.1117\/12.526686"},{"doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Security of Fragile Authentication Watermarks with Localization. In: Proc. SPIE Photonic West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, January 2002, vol.\u00a04675, pp. 691\u2013700 (2002)","key":"16_CR2","DOI":"10.1117\/12.465330"},{"doi-asserted-by":"crossref","unstructured":"Lin, C.-Y., Chang, S.-F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: SPIE Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, CA (January 2000)","key":"16_CR3","DOI":"10.1117\/12.384968"},{"doi-asserted-by":"crossref","unstructured":"Celik, M.U., Sharma, G., Murat Tekalp, A., Saber, E.: Video authentication with self-recovery. In: Video Authentication with Self-Recovery, Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV (January 2002)","key":"16_CR4","DOI":"10.1117\/12.465311"},{"doi-asserted-by":"crossref","unstructured":"Lin, C.-Y., Chang, S.-F.: Issues and Solutions for Authenticating MPEG Video. In: SPIE Security and Watermarking of Multimedia Contents, EI 1999, San Jose, CA (January 1999)","key":"16_CR5","DOI":"10.1117\/12.344703"},{"doi-asserted-by":"crossref","unstructured":"Maeno, K., Sun, Q., Chang, S.-F., Suto, M.: New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV, January 2002, vol.\u00a04675, pp. 659\u2013670 (2002)","key":"16_CR6","DOI":"10.1117\/12.465327"},{"doi-asserted-by":"crossref","unstructured":"Setyawan, I., Lagendijk, R.L.: Low bit-rate video watermarking using temporally extended differential energy watermarking (DEW) algorithm. In: Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents III, San Jose, January 21- 26 (2001)","key":"16_CR7","DOI":"10.1117\/12.435387"},{"unstructured":"Hanjalic, G.C., Langelaar, P.M.B., van Roosmalen, J., Biemond, R.L.: Image and video databases: restoration, watermarking and retrieval, 1st edn., Netherlands ISBN: 0444505024","key":"16_CR8"},{"doi-asserted-by":"crossref","unstructured":"Dittmann, J., Stabenau, M., Steinmetz, R.: Robust MEG Video Watermarking Technologies. In: Proceedings of ACM Multimedia 1998, The 6th ACM International Multimedia Conference, Bristol, England, pp. 71\u201380 (1998)","key":"16_CR9","DOI":"10.1145\/290747.290757"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/ITCC.2000.844184","volume-title":"Proceedings of the International Conference on Information Technology: Coding and Computing","author":"J. Dittmann","year":"2000","unstructured":"Dittmann, J., Mukherjee, A., Steinebach, M.: Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication. In: Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA, March 27\u201329, pp. 62\u201367. IEEE Computer Society, Los Alamitos (2000) ISBN 0 - 7695 - 0540\u20136"},{"key":"16_CR11","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/MMSP.2001.962798","volume-title":"2001 IEEE Fourth Workshop on Multimedia Signal Processing","author":"J. Dittmann","year":"2001","unstructured":"Dittmann, J., Steinbach, M.: Joint watermarking of audio-visual data. In: 2001 IEEE Fourth Workshop on Multimedia Signal Processing, Cannes France, October 3-5, pp. 601\u2013606. IEEE, Piscataway (2001) ISBN 0-7803-7025-2"},{"doi-asserted-by":"crossref","unstructured":"Mobasseri, B.G., Evans, A.T.: Content-dependent video authentication by selfwatermarking in color space. In: Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents III, San Jose, January 21-26 (2001)","key":"16_CR12","DOI":"10.1117\/12.435437"},{"doi-asserted-by":"crossref","unstructured":"Marvel, L.M., Hartwig Jr., G.W., Boncelet Jr., C.: Compressioncompatible fragile and semi-fragile tamper detection. In: Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents III, San Jose, January 21-26 (2001)","key":"16_CR13","DOI":"10.1117\/12.384967"},{"doi-asserted-by":"crossref","unstructured":"Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: Proceedings of the SPIE. International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA, January 23-28, vol.\u00a03971 (2000)","key":"16_CR14","DOI":"10.1117\/12.384969"},{"unstructured":"C.-s. Liu, H.-Y.M., Liao, C.-J.: Combined watermarking for image authentication and protection. In: Proc. 1st IEEE Int. Conf. on Multimedia and Expo, New York City, NY, USA, July 30 - August 2, vol.\u00a0III, pp. 1415\u20131418 (2000)","key":"16_CR15"},{"unstructured":"Coltue, D., Bolon, P., Chassery, J.-M.: Fragile and robust watermarking by histogram specification. In: Proc. SPIE Photonic West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, January, 2002, vol.\u00a04675, pp. 701\u2013710 (2002)","key":"16_CR16"},{"doi-asserted-by":"crossref","unstructured":"Tang, C.-w., Hang, H.-m.: An image feature based robust digital watermarking scheme. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents, Januaruy 2002, vol.\u00a04675, pp. 584\u2013595 (2002)","key":"16_CR17","DOI":"10.1117\/12.465318"},{"doi-asserted-by":"crossref","unstructured":"Wong, P.W., Memon, N.: Secret and public key authentication watermarking schemes that resist vector quantization attack. In: Proceedings of SPIE, Security and watermarking of multimedia contents II, pp. 417\u2013427 (2000)","key":"16_CR18","DOI":"10.1117\/12.384996"},{"unstructured":"Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proceedings of ICIP (October 1997)","key":"16_CR19"},{"doi-asserted-by":"crossref","unstructured":"Yin, P., Yu, H.H.: Classification of video tampering methods and countermeasures using digital watermarking. Invited paper for SPIE\u2019s International Symposium: ITCOM 2001, Denver, Colorado, USA (2001)","key":"16_CR20","DOI":"10.1117\/12.448208"},{"key":"16_CR21","volume-title":"Applied cryptography\u2014protocols, algorithms, and source code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied cryptography\u2014protocols, algorithms, and source code in C. John Wiley & Sons, Inc., Chichester (1996)"},{"doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. An Imprint of Academic Press (2002)","key":"16_CR22","DOI":"10.1016\/B978-155860714-9\/50009-2"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:22:03Z","timestamp":1558293723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}