{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T22:46:25Z","timestamp":1743461185054},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540404101"},{"type":"electronic","value":"9783540449935"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-44993-5_11","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T15:21:24Z","timestamp":1277220084000},"page":"177-189","source":"Crossref","is-referenced-by-count":14,"title":["Replacement Attack on Arbitrary Watermarking Systems"],"prefix":"10.1007","author":[{"given":"Darko","family":"Kirovski","sequence":"first","affiliation":[]},{"given":"Fabien A. P.","family":"Petitcolas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Patrizio, A.: DVD piracy: It can be done. November 1 (1999), http:\/\/www.wired.com\/news\/technology\/0,1282,32249,00.html"},{"key":"11_CR2","unstructured":"Secure Digital Music Initiative, http:\/\/www.sdmi.org"},{"key":"11_CR3","unstructured":"The DVD Copy Control Association, http:\/\/www.dvdcca.org"},{"key":"11_CR4","unstructured":"Kirovski, D., Malvar, H., Yacobi, Y.: A dual watermarking and fingerprinting system, Tech. Rep. MSR-TR-2001-57, Microsoft Research (June 2001)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: [11], pp. 218\u2013238","DOI":"10.1007\/3-540-49380-8_16"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: [12], pp. 183\u2013206","DOI":"10.1007\/3-540-61996-8_41"},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory\u00a047(4), 1423\u20131443 (2001)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Malvar, H.: Robust covert communication over a public audio channel using spread spectrum. In: [14], pp. 354\u2013368","DOI":"10.1007\/3-540-45496-9_26"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Malvar, H.: A modulated complex lapped transform and its application to audio processing. In: International Conference on Acoustics, Speech, and Signal Processing, Phoenix, Arizona, USA, March 1999, pp. 1421\u20131424 (1999)","DOI":"10.1109\/ICASSP.1999.756248"},{"key":"11_CR10","unstructured":"M\u0131h\u00e7ak, M.K.: Personal Communication"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","year":"1998","unstructured":"Aucsmith, D. (ed.): IH 1998. LNCS, vol.\u00a01525. Springer, Heidelberg (1998)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","year":"1996","unstructured":"Anderson, R. (ed.): IH 1996. LNCS, vol.\u00a01174. Springer, Heidelberg (1996)"},{"key":"11_CR13","unstructured":"Wong, P.W., Delp, E.J. (eds.): Security and Watermarking of Multimedia Contents II, San Jose, California, U.S.A, January 24\u201326, vol.\u00a03971. The Society for Imaging Science and Technology (IS&T)\/The International Society for Optical Engineering (SPIE). SPIE, Washington (2000)"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","year":"2001","unstructured":"Moskowitz, I.S. (ed.): IH 2001. LNCS, vol.\u00a02137. Springer, Heidelberg (2001)"},{"key":"11_CR15","volume-title":"Digital Compression for Multimedia : Principles and Standards","author":"J.D. Gibson","year":"1998","unstructured":"Gibson, J.D., Berger, T., Lindbergh, D., Baker III, R.L.: Digital Compression for Multimedia: Principles and Standards. Morgan Kaufmann Publishers, San Francisco (1998)"}],"container-title":["Lecture Notes in Computer Science","Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44993-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T05:38:33Z","timestamp":1559194713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44993-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540404101","9783540449935"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44993-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}