{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:59:54Z","timestamp":1742950794299,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_24","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"308-322","source":"Crossref","is-referenced-by-count":0,"title":["Dither Modulation in the Logarithmic Domain"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Comesa\u00f1a","sequence":"first","affiliation":[]},{"given":"Fernando","family":"P\u00e9rez-Gonz\u00e1lez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"24_CR1","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory\u00a047(4), 1423\u20131443 (2001)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"24_CR2","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TSP.2004.839909","volume":"53","author":"A. Abrardo","year":"2005","unstructured":"Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Transactions on Signal Processing\u00a053(2), 824\u2013833 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"10","key":"24_CR3","doi-asserted-by":"publisher","first-page":"3960","DOI":"10.1109\/TSP.2005.855407","volume":"53","author":"F. P\u00e9rez-Gonz\u00e1lez","year":"2005","unstructured":"P\u00e9rez-Gonz\u00e1lez, F., Mosquera, C., Barni, M., Abrardo, A.: Rational dither modulation: a high-rate data-hiding method robust to gain attacks. IEEE Transaction on Signal Processing\u00a053(10), 3960\u20133975 (2005)","journal-title":"IEEE Transaction on Signal Processing"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Lee, K., Kim, D.S., Moon, K.A.: Amplitude-modification resilient watermarking based on a-law companding. In: IEEE International Conference on Image Processing, September 2003, vol.\u00a03, pp. 459\u2013462 (2003)","DOI":"10.1109\/ICIP.2003.1246716"},{"issue":"4","key":"24_CR5","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TSP.2003.809368","volume":"51","author":"F. P\u00e9rez-Gonz\u00e1lez","year":"2003","unstructured":"P\u00e9rez-Gonz\u00e1lez, F., Balado, F., Hern\u00e1ndez, J.R.: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing\u00a051(4), 960\u2013980 (2003); Special Issue Signal Processing for Data Hiding in Digital Media & Secure Content Delivery","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"10","key":"24_CR6","doi-asserted-by":"publisher","first-page":"2965","DOI":"10.1109\/TSP.2004.833868","volume":"52","author":"F. Bartolini","year":"2004","unstructured":"Bartolini, F., Barni, M., Piva, A.: Performance analysis of ST-DM watermarking in presence of nonadditive attacks. IEEE Transactions on Signal Processing\u00a052(10), 2965\u20132974 (2004)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Watson, A.B.: DCT quantization matrices visually optimized for individual images. In: Proceedings of SPIE, vol.\u00a01913(14), pp. 202\u2013216 (1993); Human Vision, Visual Processing and Digital Display IV","DOI":"10.1117\/12.152694"},{"key":"24_CR8","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913512","volume-title":"Watermarking Systems Engineering","author":"M. Barni","year":"2004","unstructured":"Barni, M., Bartolini, F.: Watermarking Systems Engineering. Marcel Dekker, New York (2004)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Lemma, A., van der Veen, M., Celik, M.: A new modulation based watermarking technique for video. In: Proceedings of SPIE, vol.\u00a06072 (2006); Security, Steganography, and Watermarking of Multimedia Contents VIII","DOI":"10.1117\/12.643748"},{"issue":"2","key":"24_CR10","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TSP.2005.861894","volume":"54","author":"P. Comesa\u00f1a","year":"2006","unstructured":"Comesa\u00f1a, P., P\u00e9rez-Gonz\u00e1lez, F., Balado, F.: On distortion-compesated dither modulation data-hiding with repetition coding. IEEE Transactions on Signal Processing\u00a054(2), 585\u2013600 (2006)","journal-title":"IEEE Transactions on Signal Processing"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:57:01Z","timestamp":1738821421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}