{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:36:44Z","timestamp":1725496604725},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772545"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77255-2_38","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T03:10:54Z","timestamp":1196478654000},"page":"357-366","source":"Crossref","is-referenced-by-count":1,"title":["Design of Secure Watermarking Scheme for Watermarking Protocol"],"prefix":"10.1007","author":[{"given":"Bin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Lanjun","family":"Dang","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Kou","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xuefei","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"3","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer\u2019s rights. Journal of Visual Communication and Image Representation\u00a03, 194\u2013210 (1998)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"38_CR2","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"4","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Processing\u00a04, 643\u2013649 (2001)","journal-title":"IEEE Trans. Image Processing"},{"key":"38_CR3","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"12","author":"C.L. Lei","year":"2004","unstructured":"Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Processing\u00a012, 1618\u20131626 (2004)","journal-title":"IEEE Trans. Image Processing"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1049\/ip-ifs:20055069","volume":"1","author":"J. Zhang","year":"2006","unstructured":"Zhang, J., Kou, W., Fan, K.: Secure buyer-seller watermarking protocol. IEE Proceeding of Information Security\u00a01, 15\u201318 (2006)","journal-title":"IEE Proceeding of Information Security"},{"key":"38_CR5","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1109\/TIP.2005.859383","volume":"12","author":"M. Kuribayashi","year":"2005","unstructured":"Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Processing\u00a012, 2129\u20132139 (2005)","journal-title":"IEEE Trans. Image Processing"},{"key":"38_CR6","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"2","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a02, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"38_CR7","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"2","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences\u00a02, 270\u2013299 (1984)","journal-title":"Journal of Computer and System Sciences"},{"key":"38_CR8","first-page":"472","volume":"4","author":"T. Gamal El","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory\u00a04, 472\u2013649 (1985)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"38_CR9","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"EUROCRYPT 1999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"38_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"EUROCRYPT 1998","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 308\u2013318. Springer, Heidelberg (1998)"},{"key":"38_CR11","volume-title":"Modern Cryptography: Theory and Practice","author":"W. Mao","year":"2003","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Prentice-Hall, Englewood Cliffs (2003)"},{"key":"38_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"INSCRYPT 2007","author":"X. Tong","year":"2007","unstructured":"Tong, X., Zhang, J., Wen, Q.-Y.: New Constructions of Large Binary Sequences Family with Low Correlation. In: Lipmaa, H., Yung, M., Lin, D. (eds.) INSCRYPT 2007. LNCS, vol.\u00a04318, Springer, Heidelberg (2007)"},{"key":"38_CR13","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/TIP.2004.837557","volume":"12","author":"K. Solanki","year":"2004","unstructured":"Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Robust image-adaptive data hiding using erasure and error correction. IEEE Trans. Image Processing\u00a012, 1627\u20131639 (2004)","journal-title":"IEEE Trans. Image Processing"},{"key":"38_CR14","unstructured":"Divsalar, D., Jin, H., McEliece, R.J.: Coding theorems for turbo-like codes. In: Proc. 36th Allerton Conf. Communications, Control, Computing, pp. 201\u2013210 (1998)"},{"key":"38_CR15","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/18.910572","volume":"2","author":"F.R. Kschischang","year":"2001","unstructured":"Kschischang, F.R., Frey, B.J., Loeliger, H.-A.: Factor graphs and the sum-product algorithm. IEEE Trans. Inform. Theory\u00a02, 498\u2013519 (2001)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"4","author":"G.K. Wallace","year":"1991","unstructured":"Wallace, G.K.: The JPEG still picture compression standard. Communications of the ACM\u00a04, 30\u201344 (1991)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing \u2013 PCM 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77255-2_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:06:01Z","timestamp":1619521561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77255-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772545"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77255-2_38","relation":{},"subject":[]}}