{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T06:12:39Z","timestamp":1744697559970},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_43","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T23:00:52Z","timestamp":1294354852000},"page":"532-543","source":"Crossref","is-referenced-by-count":2,"title":["A Watermarking Scheme Applicable for Fingerprinting Protocol"],"prefix":"10.1007","author":[{"given":"Minoru","family":"Kuribayashi","sequence":"first","affiliation":[]},{"given":"Hatsukazu","family":"Tanaka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for steganography and digital watermarking, January 2000. Artech house publishers, Norwood (2000)"},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"B. Pfitzmann","year":"1997","unstructured":"Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 88\u2013102. Springer, Heidelberg (1997)"},{"key":"43_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-48910-X_11","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"B. Pfitzmann","year":"1999","unstructured":"Pfitzmann, B., Sadeghi, A.: Coin-based anonymous fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 150\u2013164. Springer, Heidelberg (1999)"},{"key":"43_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/3-540-44448-3_31","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"B. Pfitzmann","year":"2000","unstructured":"Pfitzmann, B., Sadeghi, A.: Anonymous fingerprinting with direct nonrepudiation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 401\u2013414. Springer, Heidelberg (2000)"},{"key":"43_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-45311-3_3","volume-title":"Progress in Cryptology - INDOCRYPT 2001","author":"M. Kuribayashi","year":"2001","unstructured":"Kuribayashi, M., Tanaka, H.: A new anonymous fingerprinting with high enciphering rate. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol.\u00a02247, pp. 30\u201339. Springer, Heidelberg (2001)"},{"issue":"4","key":"43_CR7","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE trans. on Image Process.\u00a010(4), 643\u2013649 (2001)","journal-title":"IEEE trans. on Image Process."},{"key":"43_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 308\u2013318. Springer, Heidelberg (1998)"},{"key":"43_CR9","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public key cryptosystems based on degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"43_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44456-4_1","volume-title":"Information Security","author":"M. Kuribayashi","year":"2000","unstructured":"Kuribayashi, M., Tanaka, H.: A watermarking scheme based on the characteristic of addition among DCT coefficients. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol.\u00a01975, pp. 1\u201314. Springer, Heidelberg (2000)"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Bender, W., Gruhl, D., Morimoto, N.: Techniques for Data Hiding. In: Proc. of SPIE, pp.164\u2013173 (1995)","DOI":"10.1117\/12.205315"},{"issue":"5","key":"43_CR12","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:21:24Z","timestamp":1558293684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}