{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:05Z","timestamp":1725516245925},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540698111"},{"type":"electronic","value":"9783540698128"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69812-8_21","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"213-220","source":"Crossref","is-referenced-by-count":1,"title":["Introducing a Two Dimensional Measure for Watermarking Capacity in Images"],"prefix":"10.1007","author":[{"given":"Farzin","family":"Yaghmaee","sequence":"first","affiliation":[]},{"given":"Mansour","family":"Jamzad","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Moulin, P., Mihcak, M.K., Lin, G.-I.: An Information-Theoretic Model For Image Watermarking And Data hiding. In: IEEE International Conference on Image Processing, vol.\u00a03, pp. 667\u2013670 (2000)","DOI":"10.1109\/ICIP.2000.899542"},{"issue":"7","key":"21_CR2","first-page":"1127","volume":"87","author":"J. Cox","year":"1999","unstructured":"Cox, J., Milller, M.L., McKellips, A.: Watermarking As Communications With Side Information. Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information\u00a087(7), 1127\u20131141 (1999)","journal-title":"Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/10719724_16","volume-title":"Information Hiding","author":"S. Voloshynovsky","year":"2000","unstructured":"Voloshynovsky, S., Herrigel, A., Baumgartner, N.: A Stochastic Approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 211\u2013236. Springer, Heidelberg (2000)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, F., Zhang, H.: Wavelet domain watermarking capacity analysis. In: Electronic Imaging and Multimedia Technology IV, Proceedings of the SPIE, vol.\u00a05637, pp. 657\u2013664 (2005)","DOI":"10.1117\/12.570628"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, F., Zhang, H.: Watermarking Capacity Analysis Based On Neural Network. In: International symposium on neural networks, Chongqing. Lecture notes in computer science (2005)","DOI":"10.1007\/11427445_126"},{"key":"21_CR6","unstructured":"Yaghmaee, F., Jamzad, M.: Computing Watermark Capacity in Images according To Their Quad Tree. In: Fifth International symposium on signal processing and information technology, Athens, Greece, December 2005, IEEE ISSPIT (2005)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Yaghmaee, F., Jamzad, M.: A New Method for Calculating Data Hiding Capacity of Gray Scale Images Based On Structural Pattern of Bitplanes. In: 4th Machine Vision and Image Processing Conference (MVIP), Mashad, Iran (February 2007)","DOI":"10.1109\/IIH-MSP.2008.186"},{"key":"21_CR8","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.: A Computational Model for Watermark Robustness. In: 8th Information Hiding Workshop 2006, Old Town Alexandria, Virginia, USA (2006)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Sheikh, H.R., Sabir, M., Bovik, A.C.: A Statistical Evaluation Of Recent Full Reference Image Quality Assessment Algorithms. IEEE Transaction on Image Processing\u00a015(11) (November 2006)","DOI":"10.1109\/TIP.2006.881959"},{"issue":"9","key":"21_CR10","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1109\/TIP.2002.802512","volume":"11","author":"P. Moulin","year":"2002","unstructured":"Moulin, P., Mihcak, M.K.: A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Transactions on Image Processing\u00a011(9), 1029\u20131042 (2002)","journal-title":"IEEE Transactions on Image Processing"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Voloshynovskiy, S., Koval, O., Kivanc Mihcak, M., Pun, T.: The Edge Process Model and Its Application to Information Hiding Capacity Analysis. IEEE Trans. on Signal Processing, 1813\u20131825 (May 2006)","DOI":"10.1109\/TSP.2006.871965"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Z., Conrad, A., Shikh, H.R., Simoncelli, P.: Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transaction on Image Processing (April 13, 2004)","DOI":"10.1109\/TIP.2003.819861"}],"container-title":["Lecture Notes in Computer Science","Image Analysis and Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69812-8_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:02:40Z","timestamp":1605762160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69812-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540698111","9783540698128"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69812-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}