{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:52:00Z","timestamp":1725490320539},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744689"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74472-6_52","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T16:31:01Z","timestamp":1188318661000},"page":"644-654","source":"Crossref","is-referenced-by-count":0,"title":["A Fragile Watermarking Scheme Protecting Originator\u2019s Rights for Multimedia Service"],"prefix":"10.1007","author":[{"given":"Grace C. -W.","family":"Ting","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Bok-Min","family":"Goi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Swee-Huay","family":"Heng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","reference":[{"issue":"4","key":"52_CR1","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TCOM.1976.1093309","volume":"24","author":"H. Andrews","year":"1976","unstructured":"Andrews, H.C., Patterson, C.L.: Singular Value Decomposition (SVD) Image Coding. IEEE Transactions on Communications, 425\u2013432 (1976)","journal-title":"IEEE Transactions on Communications"},{"key":"52_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/3-540-36617-2_14","volume-title":"Digital Watermarking","author":"S.-C. Byun","year":"2003","unstructured":"Byun, S.-C., Lee, S.-K., Tewfik, A.H., Ahn, B.-H.: A SVD-Based Fragile Watermarking Scheme for Image Authentication. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol.\u00a02613, pp. 170\u2013178. Springer, Heidelberg (2003)"},{"key":"52_CR3","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Craver, S., Memon, N.D., Yeo, B.-L., Yeung, M.M.: Can Invisible Watermarks Resolve Rightful Ownerships? In: Proceedings of SPIE Storage and Retrieval for Image and Video Databases V, vol.\u00a03022, pp. 310\u2013321 (1997)","DOI":"10.1117\/12.263419"},{"key":"52_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-540-24582-7_27","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"T.K. Das","year":"2003","unstructured":"Das, T.K.: Cryptanalysis of Block Based Spatial Domain Watermarking Schemes. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 363\u2013374. Springer, Heidelberg (2003)"},{"key":"52_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-540-31805-7_17","volume-title":"Digital Watermarking","author":"T.K. Das","year":"2005","unstructured":"Das, T.K., Zhou, J., Maitra, S.: Cryptanalysis of a Wavelet Based Watermarking Scheme. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol.\u00a03304, pp. 192\u2013203. Springer, Heidelberg (2005)"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Memon, N.: Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme. In: Proceedings of the SPIE Security and Watermarking of Multimedia Contents II, pp. 428\u2013437 (2000)","DOI":"10.1117\/12.384997"},{"key":"52_CR8","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1117\/1.1459449","volume":"11","author":"J. Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique. Journal of Electronic Imaging\u00a011, 262\u2013274 (2002)","journal-title":"Journal of Electronic Imaging"},{"issue":"3","key":"52_CR9","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"M. Holliman","year":"2000","unstructured":"Holliman, M., Memon, N.: Counterfeiting Attacks for Block-wise Independent Watermarking Techniques. IEEE Transactions on Image Processig, 432\u2013441 (2000)","journal-title":"IEEE Transactions on Image Processing"},{"key":"52_CR10","doi-asserted-by":"crossref","unstructured":"Lee, J.-W.: A Policy of Copyright Protection using Authentication Key based on Digital Watermarking. In: MUE \u201907. Proceedings of International Conference on Multimedia and Ubiquitous Engineering, pp. 1205\u20131209 (2007)","DOI":"10.1109\/MUE.2007.43"},{"key":"52_CR11","first-page":"25","volume-title":"ACM Multimedia \u201999. Proceedings of ACM Multimedia and Security Workshop","author":"E.T. Lin","year":"1999","unstructured":"Lin, E.T., Delp, E.J.: A Review of Fragile Image Watermarks. In: ACM Multimedia \u201999. Proceedings of ACM Multimedia and Security Workshop, pp. 25\u201329. ACM Press, New York (1999)"},{"issue":"1","key":"52_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R. Liu","year":"2002","unstructured":"Liu, R., Tan, T.: An SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia\u00a04(1), 121\u2013128 (2002)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3","key":"52_CR13","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1134\/S1054661806030187","volume":"16","author":"T.-C. Lu","year":"2006","unstructured":"Lu, T.-C., Chang, C.-C., Liu, Y.-L.: A Content-based Image Authentication Scheme based on Singular Value Decomposition. Pattern Recognition and Image Analysis\u00a016(3), 506\u2013522 (2006)","journal-title":"Pattern Recognition and Image Analysis"},{"key":"52_CR14","volume-title":"MMSP \u201998. Proceedings of IEEE Workshop on Multimedia Signal Processing","author":"N. Memon","year":"1998","unstructured":"Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. In: MMSP \u201998. Proceedings of IEEE Workshop on Multimedia Signal Processing, IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"52_CR15","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1997)"},{"key":"52_CR16","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer\u2019s Rights. Journal of Visual Commication & Image Representation\u00a09, 194\u2013210 (1998)","journal-title":"Journal of Visual Commication & Image Representation"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74472-6_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:31:40Z","timestamp":1619519500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74472-6_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744689"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74472-6_52","relation":{},"subject":[]}}