{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:28:04Z","timestamp":1737437284497,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_10","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"145-160","source":"Crossref","is-referenced-by-count":11,"title":["A Computational Model for Watermark Robustness"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Adelsbach","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding\u2014Second International Workshop, IH\u201998.","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Information Hiding\u20143rd International Workshop, IH\u201999.","author":"T. Mittelholzer","year":"2000","unstructured":"Mittelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 1\u201316. Springer, Heidelberg (2000)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 CRYPTO \u20192002.","author":"N.J. Hopper","year":"2002","unstructured":"Hopper, N.J., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, Springer, Heidelberg (2002)"},{"key":"10_CR4","unstructured":"Backes, M., Cachin, C.: Public-key steganography with active attacks. Report 2003\/231, Cryptology ePrint Archive (2003)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Kalker, T.: Considerations on watermark security. In: IEEE International Workshop on Multimedia Signal Processing (MMSP 2001), pp. 201\u2013206 (2001)","DOI":"10.1109\/MMSP.2001.962734"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing, pp. 2069\u20132084 (2003)","DOI":"10.1016\/S0165-1684(03)00168-3"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Cayre, F., Fontaine, C., Furon, T.: Watermarking security, part one: theory. In: IS&T\/SPIE International Symposium on Electronic Imaging 2005. In: Proceedings of the SPIE., SPIE (2005) pp.746\u2013757. Security, Steganography, and Watermarking of Multimedia Contents VII (2005)","DOI":"10.1117\/12.586876"},{"key":"10_CR8","unstructured":"Comesa\u00f1a, P., P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F.: An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios. [21]"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/11558859_12","volume-title":"Information Hiding\u20147th International Workshop, IHW 2005.","author":"P. Comesa\u00f1a","year":"2005","unstructured":"Comesa\u00f1a, P., P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F.: Fundamentals of data-hiding security and their application to spread spectrum analysis. In: Barni, M. (ed.) IH 2005. LNCS, vol.\u00a03727, pp. 146\u2013160. Springer, Heidelberg (2005)"},{"key":"10_CR10","unstructured":"Katzenbeisser, S.: Computational security models for digital watermarks [21]"},{"key":"10_CR11","volume-title":"Digital Watermarking","author":"I. Cox","year":"2002","unstructured":"Cox, I., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publisher, San Francisco (2002)"},{"key":"10_CR12","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1109\/CSFW.2002.1021823","volume-title":"15th IEEE Computer Security Foundations Workshop","author":"N. Tran","year":"2002","unstructured":"Tran, N.: Hiding functions and computational security of image watermarking systems. In: 15th IEEE Computer Security Foundations Workshop, pp. 295\u2013306. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/3-540-44987-6_16","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"A.R. Sadeghi","year":"2001","unstructured":"Sadeghi, A.R., Steiner, M.: Assumptions related to discrete logarithms: Why subtleties make a real difference. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 243\u2013260. Springer, Heidelberg (2001)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-540-24624-4_27","volume-title":"Digital Watermarking: Second International Workshop (IWDW 2003)","author":"A. Adelsbach","year":"2004","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: On the insecurity of non-invertible watermarking schemes for dispute resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 355\u2013369. Springer, Heidelberg (2004)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia data-embedding and watermarking technologies. In: Proceedings of the IEEE, vol. 86 (1998)","DOI":"10.1109\/5.687830"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.: Information Hiding: techniques for steganography and digital watermarking. Artech House Publishers (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Hartung, F., Kutter, M.: Multimedia watermarking techniques. In: Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, pp. 1079\u20131107 (1999)","DOI":"10.1109\/5.771066"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Sadeghi, A.R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020 (2003)","DOI":"10.1117\/12.477295"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Advances in Cryptology \u2013 CRYPTO \u201995.","author":"D. Boneh","year":"1995","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 452\u2013465. Springer, Heidelberg (1995)"},{"key":"10_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-58412-1","volume-title":"Complexity and Approximation","author":"G. Ausiello","year":"1999","unstructured":"Ausiello, G., Crescenzi, P., Gambosi, G., Kann, V., Marchetti-Spaccamela, A., Protasi, M.: Complexity and Approximation. Springer-Verlag, Berlin Germany (1999)"},{"key":"10_CR21","unstructured":"Piva, A. (ed.): In: 6th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS 2005), Special Session on Media Security (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T23:41:25Z","timestamp":1737416485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}