{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:02:57Z","timestamp":1725566577839},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235637"},{"type":"electronic","value":"9783540301912"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30191-2_16","type":"book-chapter","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T16:14:16Z","timestamp":1285172056000},"page":"200-210","source":"Crossref","is-referenced-by-count":1,"title":["A Semi-fragile Steganographic Digital Signature for Images"],"prefix":"10.1007","author":[{"given":"Luke","family":"Hebbes","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Lenaghan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"British Journal of Photography, p. 5. Timothy Benn Publishing (March 24, 2004)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of Image Alterations Using Semi- Fragile Watermarks. In: Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA, January 23-28, vol.\u00a03971, pp. 152\u2013163 (2000)","DOI":"10.1117\/12.384969"},{"key":"16_CR3","unstructured":"Sun, Q., Chang, S.-F., Kurato, M., Suto, M.: A new semi-fragile image authentication framework combining ECC and PKI Infrastructures, Invited paper for Special Session on Multimedia Watermarking, ISCAS 2002, Phoenix, USA (2002)"},{"key":"16_CR4","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/B978-155860769-9\/50043-3","volume-title":"Disappearing Cryptography, Information Hiding: Steganography & Watermarking","author":"P. Wayner","year":"2002","unstructured":"Wayner, P.: Disappearing Cryptography, Information Hiding: Steganography & Watermarking, 2nd edn., pp. 291\u2013302. Morgan Kaufmann, San Francisco (2002)","edition":"2"},{"key":"16_CR5","unstructured":"Kawaguchi, E.: The Principle of BPCS-Steganography, Kyushu Institute of Technology, Japan (October 2001)"},{"key":"16_CR6","unstructured":"Hoffmann, G.: Luminance Models for the Grayscale Conversion (March 30, 2002)"},{"key":"16_CR7","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. Wiley, Chichester (1996)","edition":"2"},{"key":"16_CR8","unstructured":"Hebbes, L., Malyan, R.: Comparative Performance Modelling of Turbo, Block and Convolutional Coding over very noisy Channels. In: 6th IFIP Conference on ATM, Bradford (1998)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30191-2_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:46:31Z","timestamp":1605743191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30191-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235637","9783540301912"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30191-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}