{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:17Z","timestamp":1725565337793},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_34","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T21:14:08Z","timestamp":1284153248000},"page":"321-328","source":"Crossref","is-referenced-by-count":0,"title":["Effective Digital Watermarking Algorithm by Contour Detection"],"prefix":"10.1007","author":[{"given":"Won-Hyuck","family":"Choi","sequence":"first","affiliation":[]},{"given":"Hye-jin","family":"Shim","sequence":"additional","affiliation":[]},{"given":"Jung-Sun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Barni, M., Bartolini, F., Cappellini, V., Piva, A.: Copyright protection of digital images by embedded unperceivable marks. Image and Vision Computing\u00a016 (1996)","DOI":"10.1016\/S0262-8856(98)00058-4"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal (1996)","DOI":"10.1147\/sj.353.0313"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Cox, J., Kilian, J., Leighton, F.T., Shammoon, T.: Secure Spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing (1996)","DOI":"10.1109\/83.650120"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Lu, Z.M., H, S.: Digital image watermarking technique based on vector quantisation. Electronic Letters\u00a036(4) (2000)","DOI":"10.1049\/el:20000309"},{"key":"34_CR5","unstructured":"Sungsoonthorn, Ratchata: A Watermarking Technique Based On Wavelet Packet Transform. In: SCI 2001\/ISAS 2001 (2001)"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Pitas, I.: A Method for Signature Casting on Digital Image. In: IEEE Int, Conf. On Image Processing, vol.\u00a03, pp. 219\u2013222 (1996)","DOI":"10.1109\/ICIP.1996.560422"},{"key":"34_CR7","volume-title":"A Wavelet tour of Signal Processing","author":"S. Mallat","year":"1998","unstructured":"Mallat, S.: A Wavelet tour of Signal Processing. Academic Press, London (1998)"},{"key":"34_CR8","unstructured":"Langelaar, G.C., van der Lubbe, J.C.A., Biemond, J.: Copy protection for multimedia data based on abling techniques. On Information Theory in the Benelux (1996)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:55:46Z","timestamp":1605743746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}