{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:33:49Z","timestamp":1740548029429,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232407"},{"type":"electronic","value":"9783540301264"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30126-4_92","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T05:22:11Z","timestamp":1284787331000},"page":"759-769","source":"Crossref","is-referenced-by-count":0,"title":["A Secure and Localizing Watermarking Technique for Image Authentication"],"prefix":"10.1007","author":[{"given":"Abdelkader H.","family":"Ouda","sequence":"first","affiliation":[]},{"given":"Mahmoud R.","family":"El-Sakka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"92_CR1","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1109\/ICIP.1997.638587","volume":"2","author":"M. Yeung","year":"1997","unstructured":"Yeung, M., Mintze, F.: An Invisible Watermarking Technique for Image Verification. IEEE International Conference on Image Processing\u00a02, 680\u2013683 (1997)","journal-title":"IEEE International Conference on Image Processing"},{"key":"92_CR2","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Memon, N.: Further attacks on the Yeung-Mintzer fragile watermark, SPIE Photonics West, Electronic Imaging 2001. In: Security and Watermarking of Multimedia Contents II, vol.\u00a03971, pp. 428\u2013437 (2000)","DOI":"10.1117\/12.384997"},{"key":"92_CR3","first-page":"455","volume":"I","author":"P. Wong","year":"1998","unstructured":"Wong, P.: A Public Key Watermark for Image Verification and Authentication. IEEE International Conference on Image Processing\u00a0I, 455\u2013459 (1998)","journal-title":"IEEE International Conference on Image Processing"},{"key":"92_CR4","doi-asserted-by":"crossref","unstructured":"Memon, N., Wong, P.: Secret and Public Key Authentication Watermarking Schemes that Resist Vector Quantization Attack. In: SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol.\u00a03971, pp. 471\u2013427 (2000)","DOI":"10.1117\/12.384996"},{"issue":"3","key":"92_CR5","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"M. Holliman","year":"2000","unstructured":"Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing\u00a09(3), 432\u2013441 (2000)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"10","key":"92_CR6","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"P. Wong","year":"2001","unstructured":"Wong, P., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Transactions On Image Processing\u00a010(10), 1593\u20131601 (2001)","journal-title":"IEEE Transactions On Image Processing"},{"key":"92_CR7","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message digest algorithm, Technical Report RFC1321, Internet Engineering Task Force (1992)","DOI":"10.17487\/rfc1321"},{"issue":"2","key":"92_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"92_CR9","unstructured":"Ouda, A., El-Sakka, M.: Technical report on methods to correct the Wong-Memon image watermaking scheme, London, Ontario, University of Western Ontario, Allyn and Betty Taylor Library, no QA76.5.L653 603 (2003)"},{"key":"92_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Security of Fragile Authentication Watermarks with Localization. In: SPIE Photonic West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, vol.\u00a04675, pp. 691\u2013700 (2002)","DOI":"10.1117\/12.465330"},{"key":"92_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Baldoza, A.: New Fragile Authentication Watermark for Images. In: IEEE International Conference on Image Processing, vol.\u00a01, pp. 446\u2013449 (2000)","DOI":"10.1109\/ICIP.2000.900991"},{"issue":"3","key":"92_CR12","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M. Costa","year":"1983","unstructured":"Costa, M.: Writing on dirty paper. IEEE Transactions on Information Theory\u00a029(3), 439\u2013441 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"92_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45682-1_10","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N. Courtois","year":"2001","unstructured":"Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 157\u2013174. Springer, Heidelberg (2001)"},{"issue":"3","key":"92_CR14","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"R. McEliece","year":"1978","unstructured":"McEliece, R., Berlekamp, E., Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory\u00a024(3), 384\u2013386 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"key":"92_CR15","unstructured":"McEliece, R.: A public-key cryptosystem based on algebraic coding theory, Jet Propulsion Lab. DSN Progress Report (1978)"},{"issue":"1","key":"92_CR16","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/18.272496","volume":"40","author":"R. Deng","year":"1994","unstructured":"Deng, R., Li, Y., Wang, X.: On the equivalence of mceliece\u2019s and niederreiter\u2019s public key cryptosystems. IEEE Transactions on Information Theory\u00a040(1), 271\u2013273 (1994)","journal-title":"IEEE Transactions on Information Theory"},{"key":"92_CR17","first-page":"159","volume":"15","author":"H. Niederreiter","year":"1986","unstructured":"Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. In Problem. Contribution and Information Theory\u00a015, 159\u2013166 (1986)","journal-title":"In Problem. Contribution and Information Theory"},{"key":"92_CR18","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TIT.1973.1054929","volume":"19","author":"T. Cover","year":"1973","unstructured":"Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory\u00a019, 73\u201377 (1973)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Image Analysis and Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30126-4_92.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:24:06Z","timestamp":1740522246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30126-4_92"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232407","9783540301264"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30126-4_92","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}