{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:16:50Z","timestamp":1725574610246},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540239772"},{"type":"electronic","value":"9783540305422"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30542-2_6","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T21:30:57Z","timestamp":1294435857000},"page":"42-49","source":"Crossref","is-referenced-by-count":5,"title":["A Fragile Watermarking Technique for Image Authentication Using Singular Value Decomposition"],"prefix":"10.1007","author":[{"given":"Vivi","family":"Oktavia","sequence":"first","affiliation":[]},{"given":"Won-Hyung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Yeung, M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proc. ICIP, Santa Barbara, CA, vol.\u00a02, pp. 680\u2013683 (1997)","DOI":"10.1109\/ICIP.1997.638587"},{"key":"6_CR2","unstructured":"Memon, N., Shende, S., Wong, P.: On the Security of the Yeung-Mintzer Authentication Watermark. In: Proc. of the IS and TPICS Symposium, Savannah, Georgia (2000)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"P. Wong","year":"2001","unstructured":"Wong, P., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. on Image Processing\u00a010, 1593\u20131601 (2001)","journal-title":"IEEE Trans. on Image Processing"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-36617-2_14","volume-title":"Digital Watermarking","author":"S. Byun","year":"2003","unstructured":"Byun, S., Lee, S., Tewfik, A., Ahn, B.: A SVD-Based Fragile Watermarking Scheme for Image Authentication. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol.\u00a02613, pp. 170\u2013178. Springer, Heidelberg (2003)"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R. Liu","year":"2002","unstructured":"Liu, R., Tan, T.: An SVD-based Watermarking Scheme for Protecting Rightful Ownership. IEEE Trans. on Multimedia\u00a04, 121\u2013128 (2002)","journal-title":"IEEE Trans. on Multimedia"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TCOM.1976.1093309","volume":"COM-24","author":"H. Andrews","year":"1976","unstructured":"Andrews, H., Patterson, C.: Singular Value Decomposition (SVD) Image Coding. IEEE Trans. Commun.\u00a0COM-24, 425\u2013432 (1976)","journal-title":"IEEE Trans. Commun."}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing - PCM 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30542-2_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:27:18Z","timestamp":1619998038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30542-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239772","9783540305422"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30542-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}