{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:45:05Z","timestamp":1740894305574,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_25","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"328-339","source":"Crossref","is-referenced-by-count":1,"title":["Semi-fragile Watermarking for Tamper Proofing and Authentication of Still Images"],"prefix":"10.1007","author":[{"given":"Sang-Jin","family":"Han","sequence":"first","affiliation":[]},{"given":"In Su","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Rae-Hong","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/5.771067","volume":"87","author":"R.B. Wolfgang","year":"1999","unstructured":"Wolfgang, R.B., Podilchuk, C.I., Delp, E.J.: Perceptual watermarks for digital images and video. Proc. IEEE\u00a087, 1108\u20131126 (1999)","journal-title":"Proc. IEEE"},{"key":"25_CR2","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2001","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kundur","year":"1999","unstructured":"Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE\u00a087, 1167\u20131180 (1999)","journal-title":"Proc. IEEE"},{"key":"25_CR4","unstructured":"Li, C.-T., Lou, D.-C., Chen, T.-H.: Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. In: Int. Proceedings of the IEEE ICIP, vol.\u00a03, pp. 694\u2013697 (2000)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Inoue, H., Miyazaki, A., Katsura, T.: Wavelet-based watermarking for tamper proofing of still images. In: Int. Proceedings of the IEEE ICIP, vol.\u00a02, pp. 88\u201391 (2000)","DOI":"10.1109\/ICIP.2000.899234"},{"key":"25_CR6","unstructured":"Lin, E.T., Delp, E.J.: A review of fragile image watermarks. In: Int. Proceedings of the Multimedia and Security Workshop at ACM Multimedia, pp. 36\u201339 (1999)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Wong, P.W.: A public key watermark for image verification and authentication. In: Int. Proceedings of the IEEE ICIP, vol. 1, pp. 455\u2013459 (1998)","DOI":"10.1109\/ICIP.1998.723526"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/30.267415","volume":"39","author":"G. Friedman","year":"1993","unstructured":"Friedman, G.: The trustworthy digital camera. Restoring credibility to the photographic image. IEEE Trans. Consumer Electronics\u00a039, 905\u2013910 (1993)","journal-title":"IEEE Trans. Consumer Electronics"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Wu, M., Liu, B.: Watermarking for image authentication. In: Int. Proceedings of the IEEE ICIP, vol.\u00a02, pp. 437\u2013441 (1998)","DOI":"10.1109\/ICIP.1998.723413"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Caramma, M., Lancini, R., Mapelli, F., Tubaro, S.: A blind and readable watermarking technique for color images. In: Int. Proceedings of the IEEE ICIP, vol.\u00a01, pp. 442\u2013445 (2000)","DOI":"10.1109\/ICIP.2000.900990"},{"key":"25_CR11","volume-title":"A Wavelet Tour of Signal Processing","author":"S. Mallat","year":"1999","unstructured":"Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press, San Diego (1999)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Kundur, D., Hatzinakos, D.: Towards a telltale watermarking technique for tamper proofing. In: Int. Proceedings of the IEEE ICIP, vol.\u00a02, pp. 409\u2013413 (1998)","DOI":"10.1109\/ICIP.1998.723403"},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1109\/76.867936","volume":"10","author":"J. Huang","year":"2000","unstructured":"Huang, J., Shi, Y.Q., Shi, Y.: Embedding image watermarks in DC components. IEEE Trans. Circuits and Systems for Video Technology\u00a010, 974\u2013979 (2000)","journal-title":"IEEE Trans. Circuits and Systems for Video Technology"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Chang, I.S., Park, R.-H.: Image retrieval based on data hiding. In: Int. Proceedings of the SPIE 4314, pp. 321\u2013328 (2001)","DOI":"10.1117\/12.435413"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:46:32Z","timestamp":1740836792000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}