{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:07:59Z","timestamp":1725548879836},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248392"},{"type":"electronic","value":"9783540318057"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_9","type":"book-chapter","created":{"date-parts":[[2010,2,28]],"date-time":"2010-02-28T19:26:13Z","timestamp":1267385173000},"page":"101-114","source":"Crossref","is-referenced-by-count":4,"title":["Robust Estimation of Amplitude Modification for Scalar Costa Scheme Based Audio Watermark Detection"],"prefix":"10.1007","author":[{"given":"Siho","family":"Kim","sequence":"first","affiliation":[]},{"given":"Keunsung","family":"Bae","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Boney, L., Tewfik, A., Hamdy, K.: Digital Watermarks for Audio Signals. In: IEEE Int. Conference on Multimedia Computing and Systems, pp. 473\u2013480 (1996)","DOI":"10.1109\/MMCS.1996.535015"},{"issue":"3,4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035(3,4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/3-540-61996-8_48","volume-title":"Information Hiding Workshop","author":"D. Gruhl","year":"1996","unstructured":"Gruhl, D., Lu, A.: Echo Hiding. In: Information Hiding Workshop, pp. 295\u2013315. Cambridge University, U.K (1996)"},{"key":"9_CR4","unstructured":"Oh, H.O., Youn, D.H., Hong, J.W., Seok, J.W.: Imperceptible Echo for Robust Audio Watermarking. In: AES 113th Convention, Los Angeles, CA, USA (October 2002)"},{"key":"9_CR5","unstructured":"Kim, S., Kwon, H., Bae, K.: Modification of Polar Echo Kernel for Performance Improvement of Audio Watermarking. In: International Workshop on Digital Watermarking 2003, Seoul, pp. 477\u2013487 (2003)"},{"issue":"7","key":"9_CR6","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M.H.M. Costa","year":"1983","unstructured":"Costa, M.H.M.: Writing on dirty paper. IEEE Transactions on Information Theory\u00a029(7), 439\u2013441 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transaction on Information Theory\u00a047(4) (2001)","DOI":"10.1109\/18.923725"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Eggers, J.J., Su, J.K., Girod, B.: A Blind Watermarking Scheme Based on Structured Codebooks. In: Proc. IEE Colloquium, Secure Image and Image Authentication, London, UK, pp. 4-1\u20134-6 (2000)","DOI":"10.1049\/ic:20000215"},{"key":"9_CR9","unstructured":"Moulin, P., Mihcak, M.K., Lin, G.I.: An Information-theoretic model for image water-marking and data hiding. In: IEEE Int. Conference on Image Proc., Vancouver, B.C (September 2000)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Eggers, J.J., Bauml, R., Girod, B.: Estimation of amplitude modifications before SCS watermark detection. In: SPIE: Multimedia Systems and Applications IV, San Jose, USA, vol.\u00a04675, pp. 387\u2013398 (2002)","DOI":"10.1117\/12.465297"},{"key":"9_CR11","unstructured":"Lee, K., Kim, D., Kim, T., Moon, K.: EM Estimation of Scale Factor for Quantization-based Audio Watermarking. In: International Work-shop on Digital Watermarking 2003, Seoul, pp. 335\u2013346 (2003)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T09:20:35Z","timestamp":1558862435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}