{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:54:29Z","timestamp":1725490469180},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74484-9_93","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T21:48:03Z","timestamp":1188337683000},"page":"1066-1075","source":"Crossref","is-referenced-by-count":0,"title":["An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection"],"prefix":"10.1007","author":[{"given":"Hengfu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xingming","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"A","key":"93_CR1","first-page":"1","volume":"8","author":"S. Yu-jie","year":"2003","unstructured":"Yu-jie, S., Tie-niu, T.: A Brief Review on Fragile Watermarking Based Image Authentication. Journal of image and graphics\u00a08(A)1, 1\u20137 (2003)","journal-title":"Journal of image and graphics"},{"key":"93_CR2","doi-asserted-by":"crossref","unstructured":"Wu, X., Hu, J., Gu, Z., et al.: A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters. In: Proc. of Australasian Information Security Workshop 2005, Newcastle, Australia (2005)","DOI":"10.1007\/11552451_153"},{"key":"93_CR3","unstructured":"Ishihara, N., Abe, K.: A Semi-Fragile Watermarking Scheme for Image Authentication and Tamper-Proofing. In: Proc. of 2nd International Conference on Intelligent Computing and Information Systems, Cairo, Egypt, pp. 590\u2013595 (2005)"},{"key":"93_CR4","doi-asserted-by":"crossref","unstructured":"Lin, C.Y., Chang, S.F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. SPIE Security and Watermarking of Multimedia Contents II, EI\u2019 00, San Jose, CA, pp. 140\u2013151(2000)","DOI":"10.1117\/12.384968"},{"issue":"1","key":"93_CR5","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1093\/ietfec\/E88-A.1.374","volume":"E88-A","author":"G.-r. Feng","year":"2005","unstructured":"Feng, G.-r., Jiang, L.-g., He, C.: Permutation-Based Semi-Fragile Watermark Scheme. IEICE Trans. Fundamentals\u00a0E88-A(1), 374\u2013377 (2005)","journal-title":"IEICE Trans. Fundamentals"},{"issue":"1","key":"93_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1049\/el:20030041","volume":"39","author":"Z.-M. Lu","year":"2003","unstructured":"Lu, Z.-M., Liu, C.-H., Xu, D.-G., Sun, S.-H.: Semi-fragile Image Watermarking Method Based on Index Constrained Vector Quantisation. IEE Electronics Letters\u00a039(1), 35\u201336 (2003)","journal-title":"IEE Electronics Letters"},{"key":"93_CR7","unstructured":"Kang, H., Park, J.: A Semi-Fragile Watermarking Using JND. In: Proceedings of Pacific Rim Workshop on Digital Steganography 2003, Kitakyushu, Japan (2003)"},{"key":"93_CR8","unstructured":"Liu, Y., Gao, W., Yao, H., Liu, S.: A Texture-based Tamper Detection Scheme by Fragile Watermark. In: The 2004 IEEE International Symposium on Circuits and Systems, ISCAS 2004, Vancouver, CA, pp. 177\u2013180 (May23-26, 2004)"},{"key":"93_CR9","unstructured":"Hengfu, Y., Zihua, Y., Mingfang, J.: Content Based Image Public Watermarking. In: Proceedings of Eurographics Workshop on multimedia 2004, pp. 163\u2013172 (2004)"},{"key":"93_CR10","first-page":"1403","volume-title":"Proc. IEEE","author":"F. Bartollini","year":"2001","unstructured":"Bartollini, F., Tefas, A., Barni, M., Pitas, I.: Image Authentication Techniques for Surveillance Applications. In: Proc. IEEE, vol.\u00a089 (10), pp. 1403\u20131418. IEEE Computer Society Press, Los Alamitos (2001)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74484-9_93.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:33:49Z","timestamp":1619519629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74484-9_93"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744825"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74484-9_93","relation":{},"subject":[]}}