{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:08:25Z","timestamp":1725548905058},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248392"},{"type":"electronic","value":"9783540318057"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_18","type":"book-chapter","created":{"date-parts":[[2010,2,28]],"date-time":"2010-02-28T19:26:13Z","timestamp":1267385173000},"page":"204-217","source":"Crossref","is-referenced-by-count":2,"title":["A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems"],"prefix":"10.1007","author":[{"given":"Xianfeng","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yingxia","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"18_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"G.C. Langelaar","year":"2000","unstructured":"Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data, a state-of-the-art overview. IEEE Signal Processing Magazine\u00a017(5), 20\u201346 (2000)","journal-title":"IEEE Signal Processing Magazine"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Proc. of Sicherheit in Netzen and Mediendaten, Berlin, Germany (September 2000)","DOI":"10.1007\/978-3-642-58346-9_11"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Craver, S., Katzenbeisser, S.: Security analysis of public-key watermarking schemes. In: SPIE Proc. of Mathematics of Data\/Image Coding, Compression and Encryption, with Applications, vol.\u00a04475, pp. 172\u2013182 (2001)","DOI":"10.1117\/12.449579"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/10719724_8","volume-title":"Information Hiding","author":"S. Craver","year":"2000","unstructured":"Craver, S.: Zero knowledge watermark detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 102\u2013116. Springer, Heidelberg (2000)"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/s00530-003-0098-z","volume":"9","author":"A. Adelsbach","year":"2003","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Watermark detection with zero-knowledge disclosure. Multimedia Systems\u00a09, 266\u2013278 (2003)","journal-title":"Multimedia Systems"},{"key":"18_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography, Basic Tools","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography, Basic Tools. Cambridge University Press, Cambridge (2001)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45496-9_20","volume-title":"Information Hiding","author":"A. Adelsbach","year":"2001","unstructured":"Adelsbach, A., Sadeghi, A.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 273\u2013288. Springer, Heidelberg (2001)"},{"issue":"4","key":"18_CR8","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/93.959104","volume":"8","author":"K. Gopalakrishnan","year":"2001","unstructured":"Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verification. IEEE Multimedia\u00a08(4), 66\u201370 (2001)","journal-title":"IEEE Multimedia"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1007\/978-3-540-24624-4_46","volume-title":"Digital Watermarking","author":"H.H.P. Then","year":"2004","unstructured":"Then, H.H.P., Wang, Y.C.: Towards generic detection scheme in zero knowledge protocol. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 570\u2013580. Springer, Heidelberg (2004)"},{"issue":"4","key":"18_CR10","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"S. Craver","year":"1998","unstructured":"Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications\u00a016(4), 573\u2013586 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"18_CR11","unstructured":"Sipser, M.: Introduction to the Theory of Computation. In: Thomson Learning, Stamford, Connecticut, USA (1997)"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M. Barni","year":"1998","unstructured":"Barni, M., Bartolini, F., Capellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Signal Processing\u00a066, 357\u2013372 (1998)","journal-title":"Signal Processing"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T09:20:28Z","timestamp":1558862428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}