{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T14:40:06Z","timestamp":1740840006255,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_46","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"570-580","source":"Crossref","is-referenced-by-count":2,"title":["Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection"],"prefix":"10.1007","author":[{"given":"Hang Hui Patrick","family":"Then","sequence":"first","affiliation":[]},{"given":"Yin Chai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45496-9_20","volume-title":"Information Hiding","author":"A. Adelsbach","year":"2001","unstructured":"Adelsbach, A., Sadeghi, A.-R.: Zero Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 273\u2013288. Springer, Heidelberg (2001)"},{"key":"46_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/10719724_8","volume-title":"Information Hiding","author":"S. Craver","year":"2000","unstructured":"Craver, S.: Zero Knowledge Watermark Detection. Information Hiding. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 101\u2013116. Springer, Heidelberg (2000)"},{"key":"46_CR3","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"46_CR4","first-page":"210","volume-title":"Zero Knowledge Proof of Identity","author":"U. Feige","year":"1987","unstructured":"Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proof of Identity, pp. 210\u2013216. ACM, New York (1987)"},{"key":"46_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1007\/3-540-48071-4_17","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"K. Sakurai","year":"1993","unstructured":"Sakurai, K., Itoh, T.: On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 246\u2013259. Springer, Heidelberg (1993)"},{"key":"46_CR6","unstructured":"Kim, H.J.: Email communication, Dept. Control\/Instrumentation Engineering, Kangwon National University, Korea, May 3 (2003)"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Miller, G.L., Doerr, G.J., Cox, I.J.: Dirty-Paper trellis codes for Watermarking. In: IEEE Int. Conf. on Image Processing, vol.\u00a02, pp. 129\u2013132 (2002)","DOI":"10.1109\/ICIP.2002.1039904"},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Eggers, J., Girod, B.: Quantization Watermarking. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents II, Electronic Imaging 2000, vol.\u00a03971, pp. 60\u201371 (2000)","DOI":"10.1117\/12.385006"},{"key":"46_CR9","unstructured":"Yeo, I.K., Kim, H.J.: Modified Patchwork Algorithm: a novel audio watermarking scheme. In: Proceedings of International Conference on Information Technology: Coding and Computing, pp. 237\u2013242 (2001)"},{"key":"46_CR10","unstructured":"Oh, S.H., Park, S.W., Kim, B.J.: DWT (discrete wavelet transform) based watermark system. In: International Conference on Consumer Electronics, ICCE 2002 Digest of Technical Papers, pp. 192\u2013193 (2002)"},{"key":"46_CR11","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: Cryptography Meets Watermarking: Detecting Watermarks with Minimal or Zero Knowledge Disclosure. In: XI European Signal Processing Conference, vol.\u00a01, pp. 446\u2013449 (2002)"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Craver, S., Katzenbeisser, S.: Security Analysis of Public-Key Watermarking Schemes. In: Proc. SPIE, Mathematics of Data\/Image Coding, Compression and Encryption IV, with Applications, vol.\u00a04475, pp. 172\u2013182 (2001)","DOI":"10.1117\/12.449579"},{"key":"46_CR13","unstructured":"Hachez, G., Quisquater, J-J.: Which directions for asymmetric watermarking? In: XI European Signal Processing Conference, vol. 1 (2002) #774"},{"issue":"2","key":"46_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/83.982816","volume":"11","author":"Y. Wang","year":"2002","unstructured":"Wang, Y., Doherty, J., Van Dyck, R.E.: A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images. IEEE Trans on Image Processing\u00a011(2), 77\u201388 (2002)","journal-title":"IEEE Trans on Image Processing"},{"key":"46_CR15","doi-asserted-by":"crossref","unstructured":"Ejima, M., Miyazaki, A.: A Wavelet-Based Watermarking for Digital Images and Video. In: International Conference on Image Processing, vol.\u00a03, pp. 678\u2013681 (2000)","DOI":"10.1109\/ICIP.2000.899545"},{"issue":"5","key":"46_CR16","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M. Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., Piva, A.: Improved Wavelet-Based Watermarking Through Pixel-Wise Masking. IEEE Transactions On Image Processing\u00a010(5), 783\u2013791 (2001)","journal-title":"IEEE Transactions On Image Processing"},{"key":"46_CR17","unstructured":"Reyzin, L.: Zero-Knowledge with Public Keys, PhD Thesis, Massachusetts Institute of Technology (2001)"},{"issue":"4","key":"46_CR18","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s001459900056","volume":"12","author":"V. Shoup","year":"1999","unstructured":"Shoup, V.: On the Security of a Practical Identification Scheme. Journal of Cryptology\u00a012(4), 247\u2013260 (1999)","journal-title":"Journal of Cryptology"},{"key":"46_CR19","doi-asserted-by":"crossref","unstructured":"Micali, S., Reyzin, L.: Improving the Exact Security of Digital Signature Schemes. Journal of Cryptology\u00a015(1) (2002)","DOI":"10.1007\/s00145-001-0005-8"},{"key":"46_CR20","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for designing Efficient Protocols. In: Proceedings of the 1st ACM Conference on Computer and Communication Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"46_CR21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Basic Tools","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)"},{"key":"46_CR22","unstructured":"Kalker, T.: Discussion in IWDW 2003, October 22 (2003)"},{"key":"46_CR23","unstructured":"Katzenbeisser, S.: Discussion in IWDW 2003, October 21 (2003)"},{"key":"46_CR24","doi-asserted-by":"crossref","unstructured":"Memon, N.: Discussion in IWDW 2003, October 21 (2003)","DOI":"10.1080\/08111140309957"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:46:48Z","timestamp":1740836808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}