{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:41Z","timestamp":1725491861736},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_23","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"343-354","source":"Crossref","is-referenced-by-count":1,"title":["A Collusion-Resistant Video Watermarking Scheme"],"prefix":"10.1007","author":[{"given":"Amir","family":"Houmansadr","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shahrokh","family":"Ghaemmaghami","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","first-page":"263","volume-title":"Signal processing: Image communications","author":"G. Doer","year":"2003","unstructured":"Doer, G., Dugelay, J.L.: A guide tour of video watermarking. In: Signal processing: Image communications, vol.\u00a018, pp. 263\u2013282. Elsevier Science, North-Holland, Amsterdam (2003)"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/10719724_16","volume-title":"Information Hiding","author":"S. Voloshynovskiy","year":"2000","unstructured":"Voloshynovskiy, S., Herrigel, A.N.B., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 212\u2013236. Springer, Heidelberg (2000)"},{"issue":"7","key":"23_CR4","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/34.56205","volume":"12","author":"P. Perona","year":"1990","unstructured":"Perona, P., Malik, J.: Scale-space and edge detection using anisotropic diffusion. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a012(7), 629\u2013639 (1990)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"11","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1109\/83.541427","volume":"5","author":"F. Torkamani-Azar","year":"1996","unstructured":"Torkamani-Azar, F., Tait, K.E.: Image recovery using the anisotropic diffusion equation. IEEE Trans. on Image Processing\u00a05(11), 1573\u20131578 (1996)","journal-title":"IEEE Trans. on Image Processing"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: A novel approach to collusion-resistance video watermarking. In: Proceedings of SPIE Security of Watermarking of Multimedia contents IV. San Jose, CA, pp. 491\u2013502 (2002)","DOI":"10.1117\/12.465307"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Mobasseri, B.G.: Exploring CDMA for watermarking of digital video. In: Proceedings of the SPIE 3657, pp. 96\u2013102 (1999)","DOI":"10.1117\/12.344660"},{"issue":"4","key":"23_CR8","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"C.I. Podilchuk","year":"1998","unstructured":"Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on selected areas in communications\u00a016(4), 525\u2013539 (1998)","journal-title":"IEEE Journal on selected areas in communications"},{"key":"23_CR9","unstructured":"Houmansadr, A., Ghaemmaghami, S.: A digital image watermarking scheme based on the visual cryptography. In: Proc. 3rd Int\u2019l Symposium on Telecommunications, pp. 843\u2013848 (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:21Z","timestamp":1619518281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}