{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T05:32:59Z","timestamp":1738474379479,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_23","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"325-340","source":"Crossref","is-referenced-by-count":7,"title":["Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Mathon","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Bas","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois","family":"Cayre","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"P\u00e9rez-Gonz\u00e1lez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Kalker, T.: Considerations on watermarking security. In: Proc. MMSP, pp. 201\u2013206 (October 2001)","DOI":"10.1109\/MMSP.2001.962734"},{"key":"23_CR2","first-page":"5","volume":"IX","author":"A. Kerckhoffs","year":"1883","unstructured":"Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences militaires\u00a0IX, 5\u201338 (1883)","journal-title":"Journal des Sciences militaires"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/11558859_12","volume-title":"Information Hiding","author":"P. Comesa\u00f1a","year":"2005","unstructured":"Comesa\u00f1a, P., P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 146\u2013160. Springer, Heidelberg (2005)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Kutter, M., Voloshynovskiy, S., Herrigel, A.: The watermark copy attack. In: Electronic Imaging 2000, Security and Watermarking of Multimedia Content II, vol. 3971 (2000)","DOI":"10.1117\/12.384990"},{"issue":"10","key":"23_CR5","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F. Cayre","year":"2005","unstructured":"Cayre, F., Furon, T., Fontaine, C.: Watermarking security: Theory and practice. IEEE Trans. Signal Process.\u00a053(10), 3976\u20133987 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Cayre, F., Bas, P.: Kerckhoffs based embedding security classes. IEEE Trans. Inf. Forensics Security (2007)","DOI":"10.1109\/TIFS.2007.916006"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Mathon, B., Bas, P., Cayre, F.: Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. In: Proc. ACM MM&Sec 2007 (September 2007)","DOI":"10.1145\/1288869.1288903"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell System Technical Journal"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"53","author":"H.S. Malvar","year":"2003","unstructured":"Malvar, H.S., Fl\u00f4rencio, D.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process.\u00a053, 898\u2013905 (2003)","journal-title":"IEEE Trans. Signal Process."},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Moulin, P., Briassouli, A.: A stochastic qim algorithm for robust, undetectable image watermarking. In: ICIP, pp. 1173\u20131176 (2004)","DOI":"10.1109\/ICIP.2004.1419513"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"H.W. Kuhn","year":"1955","unstructured":"Kuhn, H.W.: The Hungarian method of solving the assignment problem. Naval Res. Logistics Quart.\u00a02, 83\u201397 (1955)","journal-title":"Naval Res. Logistics Quart."},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Hill, I.D., Pike, M.C.: Algorithm 299. ACM TOMS, p. 185 (June 1985)","DOI":"10.1145\/214392.214405"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Ibbetson, D.: Algorithm 209. Collected Algorithms of the CACM, p. 616 (1963)","DOI":"10.1145\/367651.367664"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T19:16:03Z","timestamp":1738437363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}