{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:38:49Z","timestamp":1725500329764},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_6","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"76-90","source":"Crossref","is-referenced-by-count":1,"title":["Geometrically Invariant Image Watermarking in the DWT Domain"],"prefix":"10.1007","author":[{"given":"Shijun","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Hyoung-Joong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transaction on Image Proccess\u00a06(6), 1673\u20131687 (1997)","journal-title":"IEEE Transaction on Image Proccess"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/10719724_22","volume-title":"Information Hiding","author":"N. Johnson","year":"2000","unstructured":"Johnson, N., Duric, Z., Jajodia, S.: Recovery of Watermarks from Distorted Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 318\u2013332. Springer, Heidelberg (2000)"},{"key":"6_CR3","unstructured":"Davoine, F.: Triangular Meshes: A Solution to Resist to Geometric Distortions Based Watermark-Removal Softwares. In: Proc. Eurasip. Signal Processing Conference, vol.\u00a03, pp. 493\u2013496 (2000)"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"J. Ruanaidh","year":"1998","unstructured":"Ruanaidh, J., Pun, T.: Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking. Signal Processing\u00a066(3), 303\u2013317 (1998)","journal-title":"Signal Processing"},{"issue":"5","key":"6_CR5","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C.Y. Lin","year":"2001","unstructured":"Lin, C.Y., Wu, M., Bloom, J., Miller, M., Cox, I., Lui, Y.M.: Rotation, Scale, and Translation Resilient Public Watermarking for Images. IEEE Transaction on Image Processing\u00a010(5), 767\u2013782 (2001)","journal-title":"IEEE Transaction on Image Processing"},{"issue":"8","key":"6_CR6","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TCSVT.2003.815959","volume":"13","author":"D. Zheng","year":"2003","unstructured":"Zheng, D., Zhao, J., Saddik, A.: RST-Invariant Digital Image Watermarking Based on Log-Polar Mapping And Phase Correlation. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(8), 753\u2013765 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"6","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/83.846253","volume":"9","author":"S. Pereira","year":"2000","unstructured":"Pereira, S., Pun, T.: Robust Template Matching for Affine Resistant Image Watermarks. IEEE Transaction on Image Processing\u00a09(6), 1123\u20131129 (2000)","journal-title":"IEEE Transaction on Image Processing"},{"issue":"8","key":"6_CR8","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TCSVT.2003.815957","volume":"13","author":"X. Kang","year":"2003","unstructured":"Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT Composite Watermarking scheme Robust to Both Affine Transform and JPEG Compression. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(8), 776\u2013786 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"6_CR9","unstructured":"Herrigel, A., Voloshynovskiy, S., Rytsar, Y.: The Watermark Template Attack. In: Proc. SPIE Electronic Imaging (2001)"},{"issue":"8","key":"6_CR10","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TCSVT.2003.815955","volume":"13","author":"H.S. Kim","year":"2003","unstructured":"Kim, H.S., Lee, H.K.: Invariant Image Watermark Using Zernike Moments. IEEE Transaction on Circuits and Systems for Video Technology\u00a013(8), 766\u2013775 (2003)","journal-title":"IEEE Transaction on Circuits and Systems for Video Technology"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TIP.2004.823831","volume":"13","author":"M. Alghoniemy","year":"2004","unstructured":"Alghoniemy, M., Tewfik, A.H.: Geometric Invariance in Image Watermarking. IEEE Transactions on Image Processing\u00a013(2), 145\u2013153 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"12","key":"6_CR12","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TIP.2005.857263","volume":"14","author":"P. Dong","year":"2005","unstructured":"Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y.Y., Davoine, F.: Affine Transformation Resistant Watermarking Based on Image Normalizaton. IEEE Transactions on Image Processing\u00a014(12), 2140\u20132150 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1109\/TMM.2006.876300","volume":"8","author":"C.S. Lu","year":"2006","unstructured":"Lu, C.S., Sun, S.W., Hsu, C.Y., Chang, P.C.: Media Hash-Dependent Image Watermarking Resilient Against Both Geometric Attacks and Estimation Attacks Based on False Positive-Oriented Detection. IEEE Transactions on Multimedia\u00a08(4), 668\u2013685 (2006)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"4","key":"6_CR14","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1109\/TSP.2006.870581","volume":"54","author":"J.S. Seo","year":"2006","unstructured":"Seo, J.S., Yoo, C.D.: Image Watermarking Based on Invariant Regions of Scale-Space Representation. IEEE Transactions on Sginal Processing\u00a054(4), 1537\u20131549 (2006)","journal-title":"IEEE Transactions on Sginal Processing"},{"key":"6_CR15","unstructured":"http:\/\/www.cl.cam.ac.uk\/~fapp2\/watermarking\/stirmark\/"},{"key":"6_CR16","unstructured":"http:\/\/watermarking.unige.ch\/Checkmark\/"},{"issue":"3","key":"6_CR17","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s00530-003-0097-0","volume":"9","author":"I.K. Yeo","year":"2003","unstructured":"Yeo, I.K., Kim, H.J.: Generalized Patchwork Algorithm for Image Watermarking. Multimedia System\u00a09(3), 261\u2013265 (2003)","journal-title":"Multimedia System"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Coltuc, D., Bolon, P.: Watermarking by Histogram Specification. In: Proc. SPIE International Conference on Security and Watermarking of Multimedia Contents II, pp. 252\u2013263 (1999)","DOI":"10.1117\/12.344674"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Coltuc, D., Bolon, P., Chassery, J.M.: Fragile and Robust Watermarking by Histogram Specification. In: Proc. SPIE International Conference Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 701\u2013710 (2002)","DOI":"10.1117\/12.465331"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-540-30543-9_43","volume-title":"Advances in Multimedia Information Processing - PCM 2004","author":"S. Lee","year":"2004","unstructured":"Lee, S., Suh, Y., Ho, Y.: Lossless Data Hiding Based on Histogram Modification of Difference Images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol.\u00a03333, pp. 340\u2013347. Springer, Heidelberg (2004)"},{"issue":"3","key":"6_CR21","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MMUL.2005.46","volume":"12","author":"V. Licks","year":"2005","unstructured":"Licks, V., Jordan, R.: Geometric Attacks on Image Watermarking Systems. IEEE Multimedia\u00a012(3), 68\u201378 (2005)","journal-title":"IEEE Multimedia"},{"key":"6_CR22","unstructured":"Xiang, S., Huang, J., Yang, R.: Time-scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. In: Proc. of Information Hiding workshop (June 2006)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Xiang, S., Kim, H.J.: An Invariant Image Watermarking Against Geometric Attacks. In: Proc. International Joint Workshop on Information Security and Its Applications (February 2007)","DOI":"10.1007\/978-3-540-77535-5_6"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T13:20:27Z","timestamp":1557148827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}