{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:44:39Z","timestamp":1740894279149,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_27","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"355-369","source":"Crossref","is-referenced-by-count":12,"title":["On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Adelsbach","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/10719724_9","volume-title":"Information Hiding","author":"A. Adelsbach","year":"2000","unstructured":"Adelsbach, A., Pfitzmann, B., Sadeghi, A.-R.: Proving ownership of digital content. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 126\u2013141. Springer, Heidelberg (2000)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Sadeghi, A.-R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents V, vol.\u00a05020, pp. 677\u2013688 (2003)","DOI":"10.1117\/12.477295"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Adelsbach, A.A., Katzenbeisser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Proc. of ACM CCS-10 Workshop on Digital Rights Management (October 2003)","DOI":"10.1145\/947380.947395"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"D. Boneh","year":"1995","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 452\u2013465. Springer, Heidelberg (1995)"},{"key":"27_CR5","volume-title":"Digital Watermarking","author":"I. Cox","year":"2002","unstructured":"Cox, I., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publisher, San Francisco (2002)"},{"issue":"4","key":"27_CR6","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"S. Craver","year":"1998","unstructured":"Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications\u00a016(4), 573\u2013586 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"27_CR7","unstructured":"Koch, E., Zhao, J.: Towards robust and hidden image copyright labeling. In: Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing, pp. 452\u2013455 (1995)"},{"key":"27_CR8","unstructured":"Kutter, M., Leprevost, F.: Symbiose von Kryptographie und digitalen Wasserzeichen: Effizienter Schutz des Urheberrechtes digitaler Medien. In: Tagungsband des 6. Deutschen IT-Sicherheitskongress, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, pp. 1\u20134 (May 1999)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Nikolaidis, N., Pitas, I.: Copyright protection of images using robust digital signatures. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 1996), May 1996, vol.\u00a04, pp. 2168\u20132171 (1996)","DOI":"10.1109\/ICASSP.1996.545849"},{"key":"27_CR10","unstructured":"Pitas, I., Voyatzis, G.: Applications of toral automorphisms in image watermarking. IEEE Signal Processing Society (1996)"},{"key":"27_CR11","first-page":"276","volume-title":"International Conference on Multimedia Computing and Systems (ICMCS)","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking methods for MPEG encoded video: Towards resolving rightful ownership. In: International Conference on Multimedia Computing and Systems (ICMCS), Austin, Texas, USA, pp. 276\u2013285. IEEE, Washington (1998)"},{"issue":"3","key":"27_CR12","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer\u2019s rights. Journal of Visual Communication and Image Representation\u00a09(3), 194\u2013210 (1998)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"27_CR13","unstructured":"Ramkumar, M., Akansu, A.: Image watermarks and counterfeit attacks: Some problems and solutions. In: Symposium on Content Security and Data Hiding in Digital Media, Newark, NJ, USA, May 1999, New Jersey Institute of Technology, pp. 102\u2013112 (1999)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia dataembedding and watermarking technologies. Proceedings of the IEEE 86(6) (June 1998)","DOI":"10.1109\/5.687830"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Wolfgang, R., Delp, E.: Overview of image security techniques with applications in multimedia systems. In: Proceedings of the SPIE International Conference on Voice, Video, and Data Communications, pp. 297\u2013308 (1997)","DOI":"10.1117\/12.300900"},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/ICIP.1997.647972","volume-title":"4th International Conference on Image Processing (ICIP)","author":"W. Zeng","year":"1997","unstructured":"Zeng, W., Liu, B.: On resolving rightful ownerships of digital images by invisible watermarks. In: 4th International Conference on Image Processing (ICIP), Santa Barbara, CA, USA, October 1997, pp. 552\u2013555. IEEE, Los Alamitos (1997)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:46:49Z","timestamp":1740836809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}