{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T05:23:10Z","timestamp":1739942590465,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248392"},{"type":"electronic","value":"9783540318057"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_11","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:26:13Z","timestamp":1267403173000},"page":"125-136","source":"Crossref","is-referenced-by-count":15,"title":["Alteration-Locating Authentication Watermarking for Binary Images"],"prefix":"10.1007","author":[{"given":"Hae Yong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ricardo Lopes","family":"de Queiroz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Baharav, Z., Shaked, D.: Watermarking of Dither Halftone Images, Hewlett- Packard Labs. Tech. Rep. HPL-98-32 (1998)","DOI":"10.1117\/12.344681"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Kim, H.Y.: Pitfalls in Public KeyWatermarking. In: Sibgrapi \u2013 Brazilian Symp. Computer Graphics and Image Processing, pp. 241\u2013242 (1999)","DOI":"10.1109\/SIBGRA.1999.805730"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1049\/ip-vis:20020168","volume":"149","author":"P.S.L.M. Barreto","year":"2002","unstructured":"Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward a Secure Public-Key Blockwise Fragile Authentication Watermarking. IEE Proc. Vision, Image and Signal Processing\u00a0149(2), 57\u201362 (2002)","journal-title":"IEE Proc. Vision, Image and Signal Processing"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"issue":"6","key":"11_CR5","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TIP.2002.1014990","volume":"11","author":"M.U. Celik","year":"2002","unstructured":"Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical Watermarking for Secure Image Authentication with Localization. IEEE Trans. Image Processing\u00a011(6), 585\u2013595 (2002)","journal-title":"IEEE Trans. Image Processing"},{"key":"11_CR6","unstructured":"Chen, Y.-Y., Pan, H.-K., Tseng, Y.-C.: A Secure Data Hiding Scheme for Binary Images. In: IEEE Symposium on Computers and Communications, pp. 750\u2013755 (2000)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-24624-4_15","volume-title":"Digital Watermarking","author":"I.G. Chun","year":"2004","unstructured":"Chun, I.G., Ha, S.: A Robust Printed Image Watermarking Based on Iterative Halftoning Method. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 200\u2013211. Springer, Heidelberg (2004)"},{"key":"11_CR8","unstructured":"de Queiroz, R., Fleckenstein, P.: Object Modification for Data Embedding through Template Ranking. Xerox Invention Proposal (1999)"},{"key":"11_CR9","unstructured":"Deseilligny, M.P., Le Men, H.: An Algorithm for Digital Watermarking of Binary Images, Application to Map and Text Images (1998), available at, http:\/\/www-ima.enst.fr\/maitre\/tatouage\/MPdSHK.ps"},{"key":"11_CR10","first-page":"2318","volume":"4","author":"M.S. Fu","year":"2000","unstructured":"Fu, M.S., Au, O.C.: Data Hiding by Smart Pair Toggling for Halftone Images. IEEE Int. Conf. Acoustics, Speech and Signal Processing\u00a04, 2318\u20132321 (2000)","journal-title":"IEEE Int. Conf. Acoustics, Speech and Signal Processing"},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TIP.2002.999680","volume":"11","author":"M.S. Fu","year":"2002","unstructured":"Fu, M.S., Au, O.C.: Data Hiding Watermarking for Halftone Images. IEEE Trans. Image Processing\u00a011(4), 477\u2013484 (2002)","journal-title":"IEEE Trans. Image Processing"},{"issue":"3","key":"11_CR12","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1117\/1.1382612","volume":"10","author":"H.Z. Hel-Or","year":"2001","unstructured":"Hel-Or, H.Z.: Watermarking and Copyright Labeling of Printed Images. Journal of Electronic Imaging\u00a010(3), 794\u2013803 (2001)","journal-title":"Journal of Electronic Imaging"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"M. Holliman","year":"2000","unstructured":"Holliman, M., Memon, N.: Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes. IEEE Trans. Image Processing\u00a09(3), 432\u2013441 (2000)","journal-title":"IEEE Trans. Image Processing"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Binary Images. In: Proc. Sibgrapi \u2013 Brazilian Symp. on Comp. Graph. and Image Proc., pp. 199\u2013206 (2003)","DOI":"10.1109\/SIBGRA.2003.1241009"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Halftone and Binary Images. Int. J. Imaging Systems and Technology (to appear)","DOI":"10.1002\/ima.20018"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Knox, K.T., Wang, S.: Digital Watermarks Using Stochastic Screens, Color Imaging: Device-Independent Color, Color Hard Copy, and Graphic Arts II. In: SPIE Proc., February 1997, vol.\u00a03018, pp. 316\u2013322 (1997)","DOI":"10.1117\/12.271608"},{"key":"11_CR17","unstructured":"Li, C.T., Lou, D.C., Chen, T.H.: Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem. In: IEEE Int. Conf. Image Processing, vol.\u00a03, pp. 694\u2013697 (2000)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Maxemchuk, N.F., Low, S.: Marking Text Documents. In: Int. Conf. Image Processing, vol.\u00a03, pp. 13\u201317 (1997)","DOI":"10.1109\/ICIP.1997.631958"},{"issue":"8","key":"11_CR19","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/TCSVT.2003.815943","volume":"13","author":"S.C. Pei","year":"2003","unstructured":"Pei, S.C., Guo, J.M.: Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images. IEEE Trans. on Circuits and Systems for Video Technology\u00a013(8), 867\u2013884 (2003)","journal-title":"IEEE Trans. on Circuits and Systems for Video Technology"},{"key":"11_CR20","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)"},{"issue":"8","key":"11_CR21","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TCOMM.2002.801488","volume":"50","author":"Y.-C. Tseng","year":"2002","unstructured":"Tseng, Y.-C., Chen, Y.-Y., Pan, H.-K.: A Secure Data Hiding Scheme for Binary Images. IEEE Trans. on Communications\u00a050(8), 1227\u20131231 (2002)","journal-title":"IEEE Trans. on Communications"},{"key":"11_CR22","unstructured":"Wong, P.W.: AWatermark for Image Integrity and Ownership Verification. IS&T PIC Conference (Portland, OR) (May 1998), also available as Hewlett-Packard Labs. Tech. Rep. HPL-97-72 (May 1997)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Wong, P.W.: A Public Key Watermark for Image Verification and Authentication. In: IEEE Int. Conf. Image Processing, vol.\u00a01, pp. 455\u2013459 (1998), (MA11.07)","DOI":"10.1109\/ICIP.1998.723526"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Wong, P.W., Memon, N.: Secret and Public Key ImageWatermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. Image Processing, \u00a010(10), 1593\u20131601 (2001)","DOI":"10.1109\/83.951543"},{"key":"11_CR25","unstructured":"Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: IEEE Int. Conf. Multimedia and Expo., ICME 2000, New York, USA (2000)"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Yeung, M.M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: IEEE Int. Conf. Image Processing, vol.\u00a01, pp. 680\u2013683 (1997)","DOI":"10.1109\/ICIP.1997.638587"},{"key":"11_CR27","unstructured":"Zhao, J., Koch, E.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. Int. Cong. Intellectual Property Rights, Knowledge and New Technologies, pp. 242\u2013251 (1995)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T22:26:01Z","timestamp":1739917561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}