{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:41:33Z","timestamp":1725500493863},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773696"},{"type":"electronic","value":"9783540773702"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_13","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T02:14:38Z","timestamp":1199326478000},"page":"189-203","source":"Crossref","is-referenced-by-count":0,"title":["Security of Invertible Media Authentication Schemes Revisited"],"prefix":"10.1007","author":[{"given":"Daniel","family":"D\u00f6nigus","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Endler","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"H\u00fclsing","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"J\u00e4ger","sequence":"additional","affiliation":[]},{"given":"Anja","family":"Lehmann","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Podrazhansky","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Schipp","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Tews","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Vowe","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Walthart","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Weidemann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT 1996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures \u2013How to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11745853_15","volume-title":"Public Key Cryptography - PKC 2006","author":"D. Boneh","year":"2006","unstructured":"Boneh, D., Shen, E., Waters, B.: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 229\u2013240. Springer, Heidelberg (2006)"},{"key":"13_CR3","first-page":"493","volume-title":"Proceedings of SEC 2005","author":"J. Dittmann","year":"2005","unstructured":"Dittmann, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Ensuring Media Integrity on Third-Party Infrastructures. In: Proceedings of SEC 2005. 20th International Conference on Information Security, pp. 493\u2013508. Springer, Heidelberg (2005)"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1155\/S1110865702000537","volume":"2","author":"J. Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless data embedding \u2013 new paradigm in digital watermarking. EURASIP Journal of Applied Signal Processing\u00a02, 185\u2013196 (2002)","journal-title":"EURASIP Journal of Applied Signal Processing"},{"issue":"2","key":"13_CR5","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Science\u00a028(2), 270\u2013299 (1984)","journal-title":"Journal of Computer and System Science"},{"key":"13_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: The Foundations of Cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2004)"},{"key":"13_CR7","unstructured":"Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US patent application, Docket No: 77102\/E\/D (1999)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_20","volume-title":"Theory of Cryptography","author":"N. Hopper","year":"2007","unstructured":"Hopper, N., Molnar, D., Wagner, D.: From Weak to Strong Watermarking. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, Springer, Heidelberg (2007)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Dittmann, J.: Malicious attacks on media authentication schemes based on invertible watermarks. In: Security, Steganography, and Watermarking of Multimedia Contents. Proceedings of SPIE, vol.\u00a05306, pp. 838\u2013847 (2004)","DOI":"10.1117\/12.525721"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1117\/1.482612","volume":"7","author":"M. Yeung","year":"1998","unstructured":"Yeung, M., Mintzer, F.: Invisible watermarking for image verification. Journal of Electronic Imaging\u00a07, 578\u2013591 (1998)","journal-title":"Journal of Electronic Imaging"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T02:36:58Z","timestamp":1539311818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}