{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:30Z","timestamp":1725574410889},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_4","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T23:00:52Z","timestamp":1294354852000},"page":"50-60","source":"Crossref","is-referenced-by-count":11,"title":["On the Integration of Watermarks and Cryptography"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Katzenbeisser","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-540-24624-4_27","volume-title":"Digital Watermarking","author":"A. Adelsbach","year":"2004","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: On the insecurity of noninvertible watermarking schemes for dispute resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 355\u2013369. Springer, Heidelberg (2004)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: Watermark detection with zero-knowledge disclosure. ACM Multimedia Systems Journal (2003) (to appear)","DOI":"10.1007\/s00530-003-0098-z"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Digital Rights Management, DRM 2003 (2003)","DOI":"10.1145\/947380.947395"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/10719724_9","volume-title":"Information Hiding","author":"A. Adelsbach","year":"2000","unstructured":"Adelsbach, A., Pfitzmann, B., Sadeghi, A.: Proving ownership of digital content. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 117\u2013133. Springer, Heidelberg (2000)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45496-9_20","volume-title":"Information Hiding","author":"A. Adelsbach","year":"2001","unstructured":"Adelsbach, A., Sadeghi, A.-R.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 273\u2013288. Springer, Heidelberg (2001)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Sadeghi, A.-R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In: Proceedings of the SPIE vol. 5020, Security and Watermarking of Multimedia Contents V, pp. 677\u2013688 (2003) (to appear)","DOI":"10.1117\/12.477295"},{"key":"4_CR7","volume-title":"Security Engineering","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering. Wiley, Chichester (2001)"},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"I. Cox","year":"1998","unstructured":"Cox, I., Linnartz, J.-P.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications\u00a016(4), 587\u2013593 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/10719724_8","volume-title":"Information Hiding","author":"S. Craver","year":"2000","unstructured":"Craver, S.: Zero knowledge watermark detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 101\u2013116. Springer, Heidelberg (2000)"},{"key":"4_CR10","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-0-387-35413-2_15","volume-title":"Communications and Multimedia Security Issues of the New Century","author":"S. Craver","year":"2001","unstructured":"Craver, S., Katzenbeisser, S.: Copyright protection protocols based on asymmetric watermarking. In: Communications and Multimedia Security Issues of the New Century, pp. 159\u2013170. Kluwer, Dordrecht (2001)"},{"issue":"4","key":"4_CR11","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"S. Craver","year":"1998","unstructured":"Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Journal on Selected Areas in Communications\u00a016(4), 573\u2013586 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","first-page":"89","volume-title":"Information Hiding","author":"P. Duhamel","year":"2000","unstructured":"Duhamel, P., Furon, T.: An asymmetric public detection watermarking technique. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 89\u2013100. Springer, Heidelberg (2000)"},{"key":"4_CR13","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/978-3-642-58346-9_11","volume-title":"Sicherheit in Netzen und Medienstr\u00f6men","author":"J.J. Eggers","year":"2000","unstructured":"Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Sicherheit in Netzen und Medienstr\u00f6men, pp. 124\u2013133. Springer, Heidelberg (2000)"},{"key":"4_CR14","unstructured":"Eggers, J.J., Su, J.K., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference (2000)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Memon, N., Wong, P.W.: Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. In: Proceedings of the SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 189\u2013294 (1999)","DOI":"10.1117\/12.344679"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"issue":"3","key":"4_CR17","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer\u2019s rights. Journal of Visual Communication and Image Representation\u00a09(3), 194\u2013210 (1998)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"van Schyndel, R.G., Tirkel, A.Z., Svalbe, I.D.: Key independent watermark detection. In: Proceedings of the IEEE International Conference on Multimedia Computing and Systems, vol.\u00a01, pp. 580\u2013585 (1999)","DOI":"10.1109\/MMCS.1999.779265"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Zeng, W., Liu, B.: On resolving ownerships of digital images by invisible watermarks. In: IEEE Int. Conf. on Image Processing, vol. I, pp. 552\u2013555 (1997)","DOI":"10.1109\/ICIP.1997.647972"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T13:05:31Z","timestamp":1559912731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}