{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:28:00Z","timestamp":1743154080294,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_5","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"45-59","source":"Crossref","is-referenced-by-count":0,"title":["Attack Analysis for He &amp; Wu\u2019s Joint Watermarking\/Fingerprinting Scheme"],"prefix":"10.1007","author":[{"given":"Hans Georg","family":"Schaathun","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory\u00a044(5), 1897\u20131905 (1998); presented in part at CRYPTO 1995","journal-title":"IEEE Trans. Inform. Theory"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TIFS.2006.873597","volume":"1","author":"S. He","year":"2006","unstructured":"He, S., Wu, M.: Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans. Information Forensics and Security\u00a01, 231\u2013248 (2006)","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Schaathun, H.G., Fernandez-Mu\u00fcoz, M.: Boneh-Shaw fingerprinting and soft decision decoding. In: Information Theory Workshop, Rotorua, NZ (2005)","DOI":"10.1109\/ITW.2005.1531884"},{"issue":"3","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/18.915661","volume":"47","author":"J.N. Staddon","year":"2001","unstructured":"Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inform. Theory\u00a047(3), 1042\u20131049 (2001)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. Journal of the ACM (2005); In: part at STOC 2003 (to appear), http:\/\/www.renyi.hu\/~tardos\/fingerprint.ps","DOI":"10.1145\/780559.780561"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Wagner, N.R.: Fingerprinting. In: Proceedings of the 1983 Symposium on Security and Privacy (1983)","DOI":"10.1109\/SP.1983.10018"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion resistant fingerprinting for multimedia. IEEE Signal Processing Magazine (2004)","DOI":"10.1155\/S1110865704312151"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Zhao, H., Wu, M., Wang, Z.J., Liu, K.J.R.: Nonlinear collusion attacks on independent fingerprints for multimedia. IEEE Trans. Image Proc., 646\u2013661 (2005)","DOI":"10.1109\/TIP.2005.846035"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T23:37:35Z","timestamp":1684798655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}