{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:26:11Z","timestamp":1742912771731,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773696"},{"type":"electronic","value":"9783540773702"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_18","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T02:14:38Z","timestamp":1199326478000},"page":"267-278","source":"Crossref","is-referenced-by-count":2,"title":["A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization"],"prefix":"10.1007","author":[{"given":"Peizhong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Dan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"18_CR1","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/TIP.2002.801587","volume":"11","author":"P. Bas","year":"2002","unstructured":"Bas, P., Chassery, J.M., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. on Image Processing\u00a011(9), 1014\u20131028 (2002)","journal-title":"IEEE Trans. on Image Processing"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-31805-7_4","volume-title":"Digital Watermarking","author":"G. Xue","year":"2005","unstructured":"Xue, G., Lu, P.: A counter-geometric distortions data hiding scheme using double channels in color images. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol.\u00a03304, pp. 33\u201344. Springer, Heidelberg (2005)"},{"issue":"12","key":"18_CR3","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TIP.2005.857263","volume":"14","author":"P. Dong","year":"2005","unstructured":"Dong, P., Brankov, J.G.: Digital watermarking robust to geometric distortions. IEEE Trans. on Image Processing\u00a014(12), 2140\u20132150 (2005)","journal-title":"IEEE Trans. on Image Processing"},{"issue":"8","key":"18_CR4","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TCSVT.2003.815957","volume":"13","author":"X. Kang","year":"2003","unstructured":"Kang, X., Huang, J., Shi, Y.Q., et al.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol.\u00a013(8), 776\u2013785 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Harris, C., Stephen, M.: A combined corner and edge detector. In: Proc. of the 4th Alvey Vision Conf., pp.147\u2013151 (1988)","DOI":"10.5244\/C.2.23"},{"key":"18_CR6","first-page":"99","volume":"60","author":"D.G. Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Compute Vision\u00a060, 99\u2013110 (2004)","journal-title":"Int. J. Compute Vision"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"34","author":"T. Siegenthaler","year":"1985","unstructured":"Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. on Comput.\u00a034, 81\u201385 (1985)","journal-title":"IEEE Trans. on Comput."},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","first-page":"76","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"P. Chose","year":"2002","unstructured":"Chose, P., Joux, A., Mitton, M.: Fast correlation attacks: an algorithmic point of view. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 76\u201388. Springer, Heidelberg (2002)"},{"issue":"4","key":"18_CR9","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1145\/378456.378514","volume":"22","author":"D.P. Mitchell","year":"1988","unstructured":"Mitchell, D.P., Netravali, A.N.: Reconstruction filters in computer graphics, Computer Graphics. Proceedings of SIGGRAPH\u00a022(4), 221\u2013228 (1988)","journal-title":"Proceedings of SIGGRAPH"},{"issue":"5","key":"18_CR10","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C.Y. Lin","year":"2001","unstructured":"Lin, C.Y., Wu, M., Bloom, J.A., et al.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. on image Processing\u00a010(5), 767\u2013782 (2001)","journal-title":"IEEE Trans. on image Processing"},{"issue":"6","key":"18_CR11","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/83.846253","volume":"9","author":"S. Pereira","year":"2000","unstructured":"Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process.\u00a09(6), 1123\u20131129 (2000)","journal-title":"IEEE Trans. Image Process."},{"key":"18_CR12","unstructured":"Dong, P., Brankov, J., Galatsanos, N., Yang, Y.: Geometric robust watermarking based on a new mesh model correction approach. In: Proc. IEEE Int. Conf. Image Processing, pp. 493\u2013496 (June 2002)"},{"issue":"1","key":"18_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/83.817598","volume":"9","author":"J.R. Hern\u00e1ndez","year":"2000","unstructured":"Hern\u00e1ndez, J.R., Amado, M., Perez, F.: DCT-Domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing\u00a09(1), 55\u201368 (2000)","journal-title":"IEEE Trans. on Image Processing"},{"key":"18_CR14","unstructured":"Petitcolas, F.: Stirmark4.0, [Online] (2006), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/users\/fapp2\/watermarking\/stirmark\/"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:10:49Z","timestamp":1558264249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}