{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:45Z","timestamp":1725491865864},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_3","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"26-41","source":"Crossref","is-referenced-by-count":3,"title":["A Cryptographic Method for Secure Watermark Detection"],"prefix":"10.1007","author":[{"given":"Michael","family":"Malkin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ton","family":"Kalker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Sadeghi, A.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding Workshop (2000)","DOI":"10.1007\/3-540-45496-9_20"},{"key":"3_CR2","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. In: 12th USENIX Security Symposium (2003)"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1145\/501983.502012","volume-title":"CCS 2001","author":"D. Catalano","year":"2001","unstructured":"Catalano, D., Gennaro, R., Howgrave-Graham, N., Nguyen, P.Q.: Paillier\u2019s cryptosystem revisited. In: CCS 2001. Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 206\u2013214. ACM Press, New York, NY, USA (2001)"},{"issue":"4","key":"3_CR4","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory\u00a047(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. on Information Theory"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Linnartz, J.-P.M.G.: Public watermarks and resistance to tampering. In: International Conference on Image Processing (ICIP 97), pp. 26\u201329 (1997)","DOI":"10.1109\/ICIP.1997.632226"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Eggers, J., Su, J., Girod, B.: Asymmetric watermarking schemes (2000)","DOI":"10.1007\/978-3-642-58346-9_11"},{"key":"3_CR7","unstructured":"Hachez, G., Quisquater, J.-J.: Which directions for asymmetric watermarking. In: XI European Signal Processing Conference (2002)"},{"key":"3_CR8","unstructured":"Kalker, T.: Secure watermark detection. In: Allerton Conference (2005)"},{"key":"3_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8592-7","volume-title":"A Course in Number Theory and Cryptography","author":"N. Koblitz","year":"1994","unstructured":"Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Heidelberg (1994)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Crypto (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"3_CR11","unstructured":"Malkin, M.: Cryptographic Methods in Multimedia Identification and Authentication. PhD thesis, Stanford University (2006), http:\/\/theory.stanford.edu\/~mikeym\/papers\/malkin-thesis.pdf"},{"key":"3_CR12","volume-title":"Crypto","author":"J. Jaffe","year":"1999","unstructured":"Jaffe, J., Kocher, P., Jun, B.: Differential power analysis: Leaking secrets. In: Crypto, Springer, Heidelberg (1999)"},{"key":"3_CR13","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Proceedings of Eurocrypt \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt \u201999, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"3_CR14","unstructured":"Chang, E.C., Li, Q.: Security of public watermarking schemes for binary sequences. In: Information Hiding Workshop (2002)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of paillier\u2019s probabilistic public-key system. In: Proc. of Public Key Cryptography (2001)","DOI":"10.1007\/3-540-44586-2_9"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Micali","year":"1984","unstructured":"Micali, S., Goldwasser, s.: Probabilistic encryption. Journal of Computer and Systems Science\u00a028, 270\u2013299 (1984)","journal-title":"Journal of Computer and Systems Science"},{"key":"3_CR17","volume-title":"Cryptography: Theory and Practice","author":"D. Stinson","year":"1995","unstructured":"Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/1022431.1022464","volume-title":"Proceedings of the 2004 Workshop on Multimedia and Security","author":"I. Venturini","year":"2004","unstructured":"Venturini, I.: Counteracting oracle attacks. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 187\u2013192. ACM Press, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:22Z","timestamp":1619518282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}