{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:05:30Z","timestamp":1737435930678,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_35","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"333-343","source":"Crossref","is-referenced-by-count":3,"title":["Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding"],"prefix":"10.1007","author":[{"given":"Kuo Lung","family":"Hung","sequence":"first","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"35_CR1","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1109\/83.623193","volume":"6","author":"Y. Eldar","year":"1997","unstructured":"Eldar, Y., Lindenbaum, M., Porat, M., Zeevi, Y.Y.: The farthest point strategy for progressive image sampling. IEEE Trans. Image Processing\u00a06(9), 1305\u20131315 (1997)","journal-title":"IEEE Trans. Image Processing"},{"issue":"1","key":"35_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"C.T. Hsu","year":"1999","unstructured":"Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing\u00a08(1), 58\u201368 (1999)","journal-title":"IEEE Trans. on Image Processing"},{"issue":"9","key":"35_CR3","doi-asserted-by":"publisher","first-page":"1950","DOI":"10.1117\/1.1391435","volume":"40","author":"K.L. Hung","year":"2001","unstructured":"Hung, K.L., Chang, C.C., Chen, T.S.: Secure discrete cosine transform based technique for recoverable tamper proofing. Optical Engineering\u00a040(9), 1950\u20131958 (2001)","journal-title":"Optical Engineering"},{"issue":"7","key":"35_CR4","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kundur","year":"1999","unstructured":"Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE\u00a087(7), 1167\u20131180 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/S0262-8856(00)00090-1","volume":"19","author":"G. Ramponi","year":"2001","unstructured":"Ramponi, G., Carato, S.: An adaptive irregular sampling algorithm and its application to image coding. Image and Vision Computing\u00a019, 451\u2013460 (2001)","journal-title":"Image and Vision Computing"},{"issue":"10","key":"35_CR6","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1109\/83.951542","volume":"10","author":"C.S. Lu","year":"2001","unstructured":"Lu, C.S., Liao, H.Y.M.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Processing\u00a010(10), 1579\u20131592 (2001)","journal-title":"IEEE Trans. Image Processing"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 227\u2013230 (1996)","DOI":"10.1109\/ICIP.1996.560425"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Swanson, M.D., Zhu, B., Tewfik, A.H.: Transparent robust image watermarking. In: Proc. ICIP 1996, pp. 211\u2013214 (1996)","DOI":"10.1109\/ICIP.1996.560421"},{"key":"35_CR9","first-page":"18","volume":"20","author":"S. Walton","year":"1995","unstructured":"Walton, S.: Image authentication for a slippery new age. Dr. Dobb\u2019s J.\u00a020, 18\u201326 (1995)","journal-title":"Dr. Dobb\u2019s J."},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Wolfgan, R.B., Delp, E.J.: A watermark for digital images. In: Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 219\u2013222 (1996)","DOI":"10.1109\/ICIP.1996.560423"},{"key":"35_CR11","unstructured":"Tsai, C.S., Chang, C.C., Chen, T.S., Chen, M.H.: Embedding robust gray-level watermarks in an image using discrete cosine transform. Distributed Multimedia Database: Techniques and Applications (to appear)"},{"key":"35_CR12","unstructured":"Fridrich, J., Goljan, M.: Protection of digital images using self embedding, Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology (May 14, 1999)"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: ICIP 1999, Kobe, Japan, pp. 25\u201328 (1999)","DOI":"10.1109\/ICIP.1999.817228"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Chae, J.J., Manjunath, B.S.: A technique for image data hiding and reconstruction without host image. In: Proceedings of the SPIE \u2013 The International Society for Optical Engineering, vol. 3657 (Security and Watermarking of Multimedia Contents), San Jose, CA, USA, pp. 386\u2013396 (1999)","DOI":"10.1117\/12.344688"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Mobasseri, B.G., Evans, A.T.: Content-dependent video authentication by self-watermarking in color space, Security and Watermarking of Multimedia Contents III. In: SPIE Proceedings, vol. 4314, pp. 35\u201344","DOI":"10.1117\/12.435437"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T08:26:36Z","timestamp":1737361596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}