{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T22:40:32Z","timestamp":1739918432990,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248392"},{"type":"electronic","value":"9783540318057"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_15","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:26:13Z","timestamp":1267403173000},"page":"171-183","source":"Crossref","is-referenced-by-count":8,"title":["Watermarking Attack: Security of WSS Techniques"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois","family":"Cayre","sequence":"first","affiliation":[]},{"given":"Caroline","family":"Fontaine","sequence":"additional","affiliation":[]},{"given":"Teddy","family":"Furon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Petitcolas, F., Steinebach, M., Raynal, F., Dittmann, J., Fontaine, C., Fates, N.: Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In: IS&T\/SPIE International Symposium on Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, vol.\u00a04314, pp. 575\u2013584 (2001)","DOI":"10.1117\/12.435442"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Kalker, T.: Considerations on watermarking seccurity. In: Proc. of the IEEE Multimedia Signal Processing workshop, Cannes, France, pp. 201\u2013206 (2001)","DOI":"10.1109\/MMSP.2001.962734"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. on information theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Trans. on information theory"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. Shannon","year":"1949","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell system technical journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell system technical journal"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1016\/S0165-1684(01)00037-8","volume":"81","author":"P. Moulin","year":"2001","unstructured":"Moulin, P.: The role of information theory in watermarking and its application to image watermarking. Signal Processing\u00a081, 1121\u20131139 (2001)","journal-title":"Signal Processing"},{"key":"15_CR6","volume-title":"Principles and Practice","author":"I. Cox","year":"2001","unstructured":"Cox, I., Miller, M., Bloom, J.: Principles and Practice. Morgan Kaufmann Publisher, San Francisco (2001)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and Practice. Accepted to IEEE transactions of Signal Processing (2004)","DOI":"10.1117\/12.586890"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Serrano, F., Murillo-Fuentes, J.: Independent component analysis applied to image watermarking. In: ICASSP 2001 (2001)","DOI":"10.1109\/ICASSP.2001.941340"},{"key":"15_CR9","first-page":"1","volume":"1","author":"S. Bounkong","year":"2002","unstructured":"Bounkong, S., Toch, B., Saad, D., Lowe, D.: ICA for watermarking digital images. Journal of Machine Learning Research\u00a01, 1\u201325 (2002)","journal-title":"Journal of Machine Learning Research"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"IWDW 2002","author":"J. Du","year":"2002","unstructured":"Du, J., Lee, C.H., Lee, H.K., Suh, Y.: Watermark attack based on blind estimation without priors. In: IWDW 2002. LNCS, Springer, Heidelberg (2002)"},{"key":"15_CR11","volume-title":"Proc. ICASSP","author":"G. Do\u00ebrr","year":"2004","unstructured":"Do\u00ebrr, G., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: Proc. ICASSP, Montrea, Canada, vol.\u00a03. IEEE, Los Alamitos (2004)"},{"key":"15_CR12","first-page":"283","volume":"18","author":"S. Pateux","year":"2003","unstructured":"Pateux, S., Guelvouit, G.L.: Practical watermarking scheme based on wide spread spectrum and game theory. Signal Processing: Image Communication\u00a018, 283\u2013296 (2003)","journal-title":"Signal Processing: Image Communication"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Eggers, J., Ba\u00fcml, R., Tzschoppe, R., Girod, B.: Scalar costa scheme for information embedding. IEEE Trans. on Signal Processing 51, 1003\u20131019 (2003)","DOI":"10.1109\/TSP.2003.809366"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. On Information Theory\u00a047, 1423\u20131443 (2001)","journal-title":"IEEE Trans. On Information Theory"},{"key":"#cr-split#-15_CR15.1","doi-asserted-by":"crossref","unstructured":"Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing\u00a083, 2069\u20132084 (2003);","DOI":"10.1016\/S0165-1684(03)00168-3"},{"key":"#cr-split#-15_CR15.2","unstructured":"Special issue on Security of Data Hiding Technologies (invited paper)"},{"key":"#cr-split#-15_CR16.1","doi-asserted-by":"crossref","unstructured":"Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing\u00a051, 981\u2013995 (2003);","DOI":"10.1109\/TSP.2003.809376"},{"key":"#cr-split#-15_CR16.2","unstructured":"Special issue on signal processing for data hiding in digital media & secure content delivery"},{"key":"15_CR17","first-page":"5","volume":"9","author":"A. Kerckhoffs","year":"1883","unstructured":"Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires\u00a09, 5\u201338 (1883)","journal-title":"Journal des sciences militaires"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/97.700921","volume":"5","author":"P. Stoica","year":"1998","unstructured":"Stoica, P., Ng, B.: On the cramer-rao bound under parametric constraints. IEEE Signal Processing Letters\u00a05, 177\u2013179 (1998)","journal-title":"IEEE Signal Processing Letters"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/S0893-6080(00)00026-5","volume":"13","author":"A. Hyv\u00e4rinen","year":"2000","unstructured":"Hyv\u00e4rinen, A., Oja, E.: Independent component analysis: a tutorial. Neural Networks\u00a013, 411\u2013430 (2000)","journal-title":"Neural Networks"},{"key":"15_CR20","unstructured":"Douglas, S.: Blind source separation and independent component analysis: a crossroad of tools and ideas. In: Proceedings of Fourth International Symposium on Independent Component Analysis and Blind Signal Separation, ICA 2003 (2003)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Dempster, A., Laird, N., Rubin, D.: Maximum likelihood from incomplete data via the em algorithm. J. Roy. Stat. Soc., 1\u201338 (1977)","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/72.761722","volume":"10","author":"A. Hyv\u00e4rinen","year":"1999","unstructured":"Hyv\u00e4rinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks\u00a010, 626\u2013634 (1999)","journal-title":"IEEE Transactions on Neural Networks"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T22:25:40Z","timestamp":1739917540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}