{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:27:48Z","timestamp":1738387668956,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540877332"},{"type":"electronic","value":"9783540877349"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87734-9_63","type":"book-chapter","created":{"date-parts":[[2008,8,31]],"date-time":"2008-08-31T06:03:30Z","timestamp":1220162610000},"page":"552-559","source":"Crossref","is-referenced-by-count":2,"title":["Fragile Watermarking Schemes for Tamperproof Web Pages"],"prefix":"10.1007","author":[{"given":"Xiangyang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hongtao","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"63_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/79.939835","volume":"18","author":"C. Podilchuk","year":"2001","unstructured":"Podilchuk, C., Delp, E.: Digital watermarking: algorithms and applications. Signal Processing Magazine, IEEE\u00a018(4), 33\u201346 (2001)","journal-title":"Signal Processing Magazine, IEEE"},{"issue":"2","key":"63_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1049\/ip-vis:20020168","volume":"149","author":"P. Barreto","year":"2002","unstructured":"Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key blockwise fragile authentication watermarking. Vision, Image and Signal Processing, IEEE\u00a0149(2), 57\u201362 (2002)","journal-title":"Vision, Image and Signal Processing, IEEE"},{"key":"63_CR3","unstructured":"Li, C., Lou, D., Chen, T.: Image authentication and integrity verification via content-basedwatermarks and a public key cryptosystem. In: IEEE Int. Conf. Image Processing, vol.\u00a03, pp. 694\u2013697 (September 2000)"},{"key":"63_CR4","doi-asserted-by":"crossref","unstructured":"Yeh, F.H., Lee, G.C.: Content-based watermarking in image authentication allowing remedying of tampered images. Optical Engineering\u00a045(7) (2006)","DOI":"10.1117\/1.2227367"},{"issue":"8","key":"63_CR5","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1016\/j.patcog.2004.12.012","volume":"38","author":"Q. Zhao","year":"2005","unstructured":"Zhao, Q., Lu, H.: A PCA-based watermarking scheme for tamper-proof of web pages. Pattern recognition\u00a038(8), 1321\u20131323 (2005)","journal-title":"Pattern recognition"},{"issue":"4","key":"63_CR6","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1016\/j.patcog.2006.04.047","volume":"40","author":"Q. Zhao","year":"2007","unstructured":"Zhao, Q., Lu, H.: PCA-based web page watermarking. Pattern Recognition\u00a040(4), 1334\u20131341 (2007)","journal-title":"Pattern Recognition"},{"key":"63_CR7","unstructured":"Jolliffe, I.: Principal Component Analysis (2002)"},{"key":"63_CR8","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"63_CR9","first-page":"1457","volume":"5","author":"P.O. Hoyer","year":"2004","unstructured":"Hoyer, P.O.: Non-negative matrix factorization with sparseness constraints. Journal of Machine Learning Research\u00a05, 1457\u20131469 (2004)","journal-title":"Journal of Machine Learning Research"},{"key":"63_CR10","volume-title":"Cryptography: Theory and Practice","author":"D. Stinson","year":"2002","unstructured":"Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (2002)"},{"key":"63_CR11","volume-title":"References of HTML","author":"T. Powell","year":"2002","unstructured":"Powell, T.: References of HTML. McGraw-Hill Education Co., New York (2002)"},{"key":"63_CR12","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Norwood (2000)"},{"issue":"6755","key":"63_CR13","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1038\/44565","volume":"401","author":"D.D. Lee","year":"1999","unstructured":"Lee, D.D., Seung, H.S.: Learning the parts of objects by non-negative matrix factorization. Nature\u00a0401(6755), 788\u2013791 (1999)","journal-title":"Nature"},{"key":"63_CR14","doi-asserted-by":"crossref","unstructured":"Liu, W., Zheng, N., Lu, X.: Non-negative matrix factorization for visual coding. In: IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 2003), vol.\u00a03, pp. 293\u2013296 (2003)","DOI":"10.1109\/ICASSP.2003.1199270"},{"key":"63_CR15","unstructured":"Sinka, M.P.: Banksearchdataset.info, http:\/\/www.banksearchdataset.info\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87734-9_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T19:23:18Z","timestamp":1738351398000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87734-9_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540877332","9783540877349"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87734-9_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}