{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:08:05Z","timestamp":1725548885572},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248392"},{"type":"electronic","value":"9783540318057"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_3","type":"book-chapter","created":{"date-parts":[[2010,2,28]],"date-time":"2010-02-28T19:26:13Z","timestamp":1267385173000},"page":"29-41","source":"Crossref","is-referenced-by-count":0,"title":["Informed Detection Revisited"],"prefix":"10.1007","author":[{"given":"Jeffrey A.","family":"Bloom","sequence":"first","affiliation":[]},{"given":"Matt L.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"3_CR1","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/5.771077","volume":"87","author":"J.A. Bloom","year":"1999","unstructured":"Bloom, J.A., Cox, I.J., Kalker, T., Linnartz, J.-P., Miller, M.L., Traw, B.: Copy protection for DVD video. Proc. IEEE\u00a087(7), 1267\u20131276 (1999)","journal-title":"Proc. IEEE"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Chen, B., Wornell, G.W.: An information-theoretic approach to the design of robust digital watermarking systems. IEEE Transactions on Acoustics, Speech, and Signal Processing (1999)","DOI":"10.1109\/ICASSP.1999.758336"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. In: Proc. Int. Symp. Inform. Theory, ISIT-2000 (2000)","DOI":"10.1109\/ISIT.2000.866336"},{"key":"3_CR4","unstructured":"Cheng, H.: Temporal video registration. In: Proc. of IEEE Int\u2019l Conf. on Acoustics, Speech and Signal Processing (ICASSP 2003), Hong Kong, China, April 2003, vol.\u00a03, pp. 489\u201392 (2003)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, H., Isnardi, M.: Spatial, temporal and histogram video registration for digital watermark detection. In: Proc. of IEEE Int\u2019l Conf. on Image Processing (ICIP 2003), Barcelona, Spain, Septemper 2003, vol.\u00a02, pp. 735\u2013738 (2003)","DOI":"10.1109\/ICIP.2003.1246785"},{"key":"3_CR6","first-page":"1503","volume":"2","author":"S. Jim Chou","year":"1999","unstructured":"Jim Chou, S., Pradhan, S., Ramchandran, K.: On the duality between distributed source coding and data hiding. Thirty-third Asilomar conference on signals, systems, and computers\u00a02, 1503\u20131507 (1999)","journal-title":"Thirty-third Asilomar conference on signals, systems, and computers"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Cohen, A.S., Lapidoth, A.: Generalized writing on dirty paper. In: International Symposium on Information Theory, ISIT (2002)","DOI":"10.1109\/ISIT.2002.1023499"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M. Costa","year":"1983","unstructured":"Costa, M.: Writing on dirty paper. IEEE Trans. Inform. Theory\u00a029, 439\u2013441 (1983)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"3_CR9","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2001","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)"},{"key":"3_CR10","first-page":"179","volume-title":"Digital Images and Human Vision","author":"S. Daly","year":"1993","unstructured":"Daly, S.: The Visible Difference Predictor: An algorithm for the assessment of image fidelity. In: Watson, A.B. (ed.) Digital Images and Human Vision, ch.14, pp. 179\u2013206. MIT Press, Cambridge (1993)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Eggers, J.J., Su, J.K., Girod, B.: A blind watermarking scheme based on structured codebooks. In: IEE Seminar on Secure Images and Image Authetication, pp. 4-1\u20131-21 (2000)","DOI":"10.1049\/ic:20000215"},{"key":"3_CR12","unstructured":"Erez, U., Shamai, S., Zamir, R.: Capacity and lattice-strategies for canceling known interferance. In: Proc. of the Cornell Summer Workshop on Inform. Theory (August 2000)"},{"key":"3_CR13","unstructured":"Fritz, B., Gray, T.M.: Acad member tied to piracy bust. Variety, January 23 (2004)"},{"key":"3_CR14","unstructured":"Secure Digital Music Initiative. SDMI portable device specification (1999), Available at, http:\/\/www.sdmi.org"},{"key":"3_CR15","first-page":"163","volume-title":"Digital Images and Human Vision","author":"J. Lubin","year":"1993","unstructured":"Lubin, J.: The use of psychophysical data and models in the analylsis of display system performance. In: Watson, A.B. (ed.) Digital Images and Human Vision, ch.14 pp. 163\u2013178. MIT Press, Cambridge (1993)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1117\/12.477336","volume":"5020","author":"J. Lubin","year":"2003","unstructured":"Lubin, J., Bloom, J.A., Cheng, H.: Robust, content-dependent, high-fidelity watermark for tracking in digital cinema. Security and Watermarking of Multimedia Contents V, SPIE\u00a05020, 536\u2013545 (2003)","journal-title":"Security and Watermarking of Multimedia Contents V, SPIE"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Miller, M.L.: Watermarking with dirty-paper codes. In: IEEE International Conference on Image Processing (September 2001)","DOI":"10.1109\/ICIP.2001.958547"},{"issue":"6","key":"3_CR18","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TIP.2003.821551","volume":"13","author":"M.L. Miller","year":"2004","unstructured":"Miller, M.L., Do\u00ebrr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust, high capacity watermark. IEEE Transactions on Image Processing\u00a013(6), 792\u2013807 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"key":"3_CR19","unstructured":"Christian, J., van den Branden, L., Farrell, J.E.: Perceptual quality metric for digitally coded color images. In: Proc. EUSIPCO, pp. 1175\u20131178 (1996)"},{"issue":"7","key":"3_CR20","first-page":"1197","volume":"87","author":"G. Voyatzis","year":"1999","unstructured":"Voyatzis, G., Pitas, I.: The use of watermark in the protection of digital multimedia products. Proceedings of the IEEE, Special Issue on Identication and Protection of Multimedia Information\u00a087(7), 1197\u20131207 (1999)","journal-title":"Proceedings of the IEEE, Special Issue on Identication and Protection of Multimedia Information"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T09:20:22Z","timestamp":1558862422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}