{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:49Z","timestamp":1725491869113},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_2","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T23:06:39Z","timestamp":1189638399000},"page":"15-25","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Asymmetric Watermarking System Using Matrix Embedding"],"prefix":"10.1007","author":[{"given":"Scott","family":"Craver","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45496-9_20","volume-title":"Information Hiding IV","author":"A. Adelsbach","year":"2001","unstructured":"Adelsbach, A., Sadeghi, A.-R.: Zero-Knowledge Watermark Detection and Proof of Ownership. In: Information Hiding IV. LNCS, vol.\u00a02137, pp. 273\u2013288. Springer, Heidelberg (2001)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications, special issue on Copyright and Privacy Protection (April 1998)","DOI":"10.1109\/49.668971"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Craver, S., Katzenbeisser, S.: Security Analysis of Public-Key Watermarking Schemes. In: Proceedings of SPIE, Mathematics of Data\/Image Coding, Compression and Encryption IV, vol. 4475, pp. 172\u2013182 (July 2001)","DOI":"10.1117\/12.449579"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/10719724_8","volume-title":"Information Hiding III","author":"S. Craver","year":"2000","unstructured":"Craver, S.: Zero Knowledge Watermarking. In: Information Hiding III. LNCS, vol.\u00a01768, pp. 101\u2013116. Springer, Heidelberg (2000)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Information Hiding IV","author":"S. Craver","year":"2004","unstructured":"Craver, S., Liu, B., Wolf, W.: An Implementation of, and Attacks on, Zero-Knowledge Watermarking. In: Information Hiding IV. LNCS, vol.\u00a03200, pp. 1\u201312. Springer, Heidelberg (2004)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Craver, S.: The Return of Ambiguity Attacks. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV, pp. 252\u2013259 (January 2002)","DOI":"10.1117\/12.465282"},{"key":"2_CR7","volume-title":"Digital Watermarking","author":"I. Cox","year":"2002","unstructured":"Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Soukal, D.: Matrix embedding for large payloads. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents VIII, pp. 6072\u201368 (January 2006)","DOI":"10.1117\/12.639933"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Hartung, F.H., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Proceedings of SPIE, pp. 147\u2013158, San Jose, CA (February 1999)","DOI":"10.1117\/12.344665"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Hartung, F.H., Girod, B.: Fast Public-Key Watermarking of Compressed Video. In: Proceedings of IEEE International Conference on Speech and Signal Processing (1997)","DOI":"10.1109\/ICIP.1997.647966"},{"key":"2_CR11","volume-title":"Applied Cryptograpy: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptograpy: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, New York (1996)","edition":"2"},{"key":"2_CR12","unstructured":"Viega, J., Girouard, Z., Messier, M.: Secure Programming Cookbook. O\u2019Reilly (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:11:20Z","timestamp":1619503880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}