{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:18:54Z","timestamp":1761823134137},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_11","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"147-160","source":"Crossref","is-referenced-by-count":14,"title":["Block-Chain Based Fragile Watermarking Scheme with Superior Localization"],"prefix":"10.1007","author":[{"given":"Hong-Jie","family":"He","sequence":"first","affiliation":[]},{"given":"Jia-Shu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Heng-Ming","family":"Tai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"11_CR1","doi-asserted-by":"publisher","first-page":"3189","DOI":"10.1109\/TIP.2006.877310","volume":"15","author":"H. Yuan","year":"2006","unstructured":"Yuan, H., Zhang, X.-P.: Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans. Image process\u00a015(10), 3189\u20133200 (2006)","journal-title":"IEEE Trans. Image process"},{"unstructured":"Wong, P.: A public key watermark for image verification and authentication. In: Proc. IEEE Int. Conf. Image Process., Chicago, IL, pp. 425\u2013429 (1998)","key":"11_CR2"},{"issue":"3","key":"11_CR3","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"H. Holliman","year":"2000","unstructured":"Holliman, H., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process\u00a09(3), 432\u2013441 (2000)","journal-title":"IEEE Trans. Image Process"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1117\/1.1459449","volume":"11","author":"J. Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electronic Imaging\u00a011, 262\u2013274 (2002)","journal-title":"J. Electronic Imaging"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"P. Wong","year":"2001","unstructured":"Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process.\u00a010, 1593\u20131601 (2001)","journal-title":"IEEE Trans. Image Process."},{"doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proc. SPIE. Security and Watermarking of Multimedia Contents, San Jose, CA, vol.\u00a04675, pp. 691\u2013700 (January 2002)","key":"11_CR6","DOI":"10.1117\/12.465330"},{"issue":"6","key":"11_CR7","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TIP.2002.1014990","volume":"11","author":"M. Celik","year":"2002","unstructured":"Celik, M., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process.\u00a011(6), 585\u2013595 (2002)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1049\/ip-vis:20020168","volume":"149","author":"P. Barreto","year":"2002","unstructured":"Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key block-wise fragile authentication watermarking. IEE Proc. -Vision, Image and Signal Process.\u00a0149(2), 57\u201362 (2002)","journal-title":"IEE Proc. -Vision, Image and Signal Process."},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1016\/j.patrec.2004.08.017","volume":"25","author":"S. Suthaharan","year":"2004","unstructured":"Suthaharan, S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters\u00a025, 1893\u20131903 (2004)","journal-title":"Pattern Recognition Letters"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1016\/S0165-1684(03)00172-5","volume":"83","author":"F. Deguillaume","year":"2003","unstructured":"Deguillaume, F., Voloshynovskiy, S., Pun, T.: Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Process\u00a083, 2133\u20132170 (2003)","journal-title":"Signal Process"},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S. Lee","year":"2007","unstructured":"Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. forensics security\u00a02(3), 321\u2013330 (2007)","journal-title":"IEEE Trans. Inf. forensics security"},{"issue":"12","key":"11_CR12","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1016\/j.patcog.2005.02.007","volume":"38","author":"P.L. Lin","year":"2005","unstructured":"Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition\u00a038(12), 2519\u20132529 (2005)","journal-title":"Pattern Recognition"},{"issue":"10","key":"11_CR13","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1109\/LSP.2007.896436","volume":"14","author":"X. Zhang","year":"2007","unstructured":"Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett.\u00a014(10), 727\u2013731 (2007)","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"11_CR14","first-page":"251","volume":"6","author":"H.J. He","year":"2006","unstructured":"He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on self-embedding watermarking schemes. Intern. J. Comput. Sci. Network Security\u00a06(1), 251\u2013257 (2006)","journal-title":"Intern. J. Comput. Sci. Network Security"},{"doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proc. ICIP 1999, Kobe, Japan, October 25-28 (1999)","key":"11_CR15","DOI":"10.1109\/ICIP.1999.817228"},{"issue":"1","key":"11_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TCSVT.2004.839978","volume":"15","author":"Y. Wu","year":"2005","unstructured":"Wu, Y., Deng, R.H.: Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Technol.\u00a015(1), 161\u2013163 (2005)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/11922841_34","volume-title":"Digital Watermarking","author":"H. He","year":"2006","unstructured":"He, H., Zhang, J., Tai, H.-M.: A wavelet-based fragile watermarking scheme for secure image authentication. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 422\u2013432. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T17:07:02Z","timestamp":1557853622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}