{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T14:40:06Z","timestamp":1740840006282,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_5","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"61-76","source":"Crossref","is-referenced-by-count":6,"title":["Content-Dependent Anti-disclosure Image Watermark"],"prefix":"10.1007","author":[{"given":"Chun-Shien","family":"Lu","sequence":"first","affiliation":[]},{"given":"Chao-Yong","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/TIP.2002.801587","volume":"11","author":"P. Bas","year":"2002","unstructured":"Bas, P., Chassery, J.M., Macq, B.: Geometrically Invariant Watermarking Using Feature Points. IEEE Trans. on Image Processing\u00a011, 1014\u20131028 (2002)","journal-title":"IEEE Trans. on Image Processing"},{"key":"5_CR2","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Visual Hash for Oblivious Watermarking. In: Proc. SPIE: Security and Watermarking of Multimedia Contents II, vol.\u00a03971 (2000)","DOI":"10.1117\/12.384982"},{"key":"5_CR4","unstructured":"IEEE Int. Workshop on Multimedia Signal Processing (MMSP), special session on Media Recognition, Virgin Islands, USA (2002)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A Video Watermarking System for Broadcast Monitoring. In: Proc. of the SPIE, vol.\u00a03657, pp. 103\u2013112 (1999)","DOI":"10.1117\/12.344661"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Kutter, M., Voloshynovskiy, S., Herrigel, A.: The Watermark Copy Attack. In: Proc. SPIE: Security and Watermarking of Multimedia Contents II, vol.\u00a03971 (2000)","DOI":"10.1117\/12.384990"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TPAMI.1980.4766994","volume":"2","author":"J.S. Lee","year":"1980","unstructured":"Lee, J.S.: Digital Image Enhancement and Noise Filtering by Use of Local Statistics. IEEE Trans. on Pattern Anal. and Machine Intell.\u00a02, 165\u2013168 (1980)","journal-title":"IEEE Trans. on Pattern Anal. and Machine Intell."},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/6046.890056","volume":"2","author":"C.S. Lu","year":"2000","unstructured":"Lu, C.S., Huang, S.K., Sze, C.J., Mark Liao, H.Y.: Cocktail Watermarking for Digital Image Protection. IEEE Trans. on Multimedia\u00a02, 209\u2013224 (2000)","journal-title":"IEEE Trans. on Multimedia"},{"issue":"2","key":"5_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TMM.2003.811621","volume":"5","author":"C.S. Lu","year":"2003","unstructured":"Lu, C.S., Mark Liao, H.Y.: Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme. IEEE Trans. on Multimedia\u00a05(2), 161\u2013173 (2003)","journal-title":"IEEE Trans. on Multimedia"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks. In: Proc. IEEE Int. Conf. on Image Processing (2001)","DOI":"10.1109\/ICIP.2001.959171"},{"issue":"4","key":"5_CR11","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/49.668976","volume":"16","author":"M.D. Swanson","year":"1998","unstructured":"Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution Scene-Based Video Watermarking Using Perceptual Models. IEEE Journal on Selected Areas in Communications\u00a016(4), 540\u2013550 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"5_CR12","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1109\/TSP.2003.809367","volume":"51","author":"C.W. Tang","year":"2003","unstructured":"Tang, C.W., Hang, H.M.: A Feature-based Robust Digital Watermarking Scheme. IEEE Trans. on Signal Processing\u00a051(4), 950\u2013959 (2003)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSP.2003.809378","volume":"51","author":"W. Trappe","year":"2003","unstructured":"Trappe, W., Wu, M., Wang, J., Ray Liu, K.J.: Anti-collusion Fingerprinting for Multimedia. IEEE Trans. on Signal Processing\u00a051, 1069\u20131087 (2003)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Voloshynovskiy, S., Pereira, S., Herrigel, A., Baumgartner, N., Pun, T.: Generalized Watermarking Attack Based on Watermark Estimation and Perceptual Remodulation. In: Proc. SPIE: Security and Watermarking of Multimedia Contents II, San Jose, CA, USA, vol.\u00a03971 (2000)","DOI":"10.1117\/12.384990"},{"issue":"6","key":"5_CR15","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/S0165-1684(01)00039-1","volume":"81","author":"S. Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack Modelling: Towards a Second Generation Watermarking Benchmark. Signal Processing\u00a081(6), 1177\u20131214 (2001)","journal-title":"Signal Processing"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Voloshynovskiy, S., Deguillaume, F., Pun, T.: Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions. In: Proc. IEEE Int. Conf. on Image Processing, pp. 999\u20131002 (2001)","DOI":"10.1109\/ICIP.2001.958294"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:46:37Z","timestamp":1740836797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}