{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:39Z","timestamp":1725574419672},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_21","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"277-288","source":"Crossref","is-referenced-by-count":15,"title":["On Perceptual Quality of Watermarked Images \u2013 An Experimental Approach"],"prefix":"10.1007","author":[{"given":"Bassem","family":"Abdel-Aziz","sequence":"first","affiliation":[]},{"given":"Jean-Yves","family":"Chouinard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"21_CR1","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kundur","year":"1999","unstructured":"Kundur, D., Hatzinakos, D.: Digital Watermarking for Telltale Tamper Proofing and Authentication. Proceedings of the IEEE\u00a087(7), 1167\u20131180 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Proc. SPIE Security & Watermarking Multimedia Contents, San Jose, CA, USA, January 1999, vol.\u00a03657, pp. 226\u2013239 (1999)","DOI":"10.1117\/12.344672"},{"key":"21_CR3","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"2002","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Prentice Hall, Englewood Cliffs (2002)","edition":"2"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1117\/1.1455011","volume":"11","author":"I. Avc\u0131ba\u015f","year":"2002","unstructured":"Avc\u0131ba\u015f, I., Sankur, B., Sayood, K.: Statistical Evaluation of Image Quality Measures. Journal of Electronic Imaging\u00a011, 206\u2013223 (2002)","journal-title":"Journal of Electronic Imaging"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/10719724_16","volume-title":"Information Hiding","author":"S. Voloshynovskiy","year":"2000","unstructured":"Voloshynovskiy, S., Herrigel, A., Baumg\u00e4rtner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, Springer, Heidelberg (2000)"},{"key":"21_CR6","volume-title":"Digital Watermarking","author":"J. Cox","year":"2002","unstructured":"Cox, J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Watson, B.: DCT quantization matrices visually optimized for individual images. In: Human Vision, Visual Processing, and Digital Display IV, Proc. SPIE, vol. 1913\u201314 (1993)","DOI":"10.1117\/12.152694"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/0378-5955(79)90025-X","volume":"1","author":"E. Terhardt","year":"1979","unstructured":"Terhardt, E.: Calculating Virtual Pitch. Hearing Research\u00a01, 155\u2013182 (1979)","journal-title":"Hearing Research"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TIT.1974.1055250","volume":"IT-4","author":"J.L. Mannos","year":"1974","unstructured":"Mannos, J.L., Sakrison, J.J.: The Effects of a Visual Fidelity Criterion on the Encoding of Images. IEEE Transactions on Information Theory\u00a0IT-4, 525\u2013536 (1974)","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Wang, Z., Bovik, A.C., Lu, L.: Why is Image Quality Assessment So Difficult? In: IEEE International Conference on Acoustics, Speech, & Signal Processing (May 2002)","DOI":"10.1109\/ICASSP.2002.5745362"},{"key":"21_CR11","unstructured":"Wu, M., Liu, B.: Watermarking for image authentication. In: IEEE International Conference on Image Processing (October 1998)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Strang, G., Nguyen, T.: Wavelets and Filter Banks. Wellesley-Cambridge Press (1997) (revised edition)","DOI":"10.1093\/oso\/9780195094237.003.0002"},{"key":"21_CR13","volume-title":"Wavelet Basics","author":"Y.T. Chang","year":"1995","unstructured":"Chang, Y.T.: Wavelet Basics. Kluwer Academic Publishers, Dordrecht (1995)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Kundur, D., Hatzinakos, D.: Towards a telltale watermarking technique for tamper proofing. In: Proc. IEEE Int. Conf. On Image Processing, vol.\u00a02, pp. 409\u2013413 (1998)","DOI":"10.1109\/ICIP.1998.723403"},{"key":"21_CR15","unstructured":"Fridrich, J.: Methods for Detecting Changes in Digital Images. In: IEEE Workshop on Intelligent Signal Processing and Communication Systems, Melbourne, Australia (November 1998)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-45496-9_25","volume-title":"Information Hiding","author":"S. Pereira","year":"2001","unstructured":"Pereira, S., Voloshynovskiy, S., Madue\u00f1o, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, p. 340. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T20:12:58Z","timestamp":1712088778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}