{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T05:19:29Z","timestamp":1738991969901,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540959717"},{"type":"electronic","value":"9783540959724"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-95972-4_15","type":"book-chapter","created":{"date-parts":[[2009,2,2]],"date-time":"2009-02-02T18:45:35Z","timestamp":1233600335000},"page":"315-332","source":"Crossref","is-referenced-by-count":0,"title":["Chaos Based Digital Watermarking"],"prefix":"10.1007","author":[{"given":"Aidan","family":"Mooney","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Netcraft WSS, Web Server Survey (May 2008) (Cited June 11, 2008), http:\/\/news.netcraft.com\/archives\/web_server_survey.html"},{"key":"15_CR2","unstructured":"De S\u00e9lincourt, Herodotus, A.: Penguin Books (Translation) (1996)"},{"key":"15_CR3","volume-title":"Hiding in Plain Sight: Steganography and the Art of Covert Communi-cation","author":"E. Cole","year":"2003","unstructured":"Cole, E.: Hiding in Plain Sight: Steganography and the Art of Covert Communi-cation. Wiley Publishing Inc., London (2003)"},{"key":"15_CR4","volume-title":"Information Hiding: Steganography and Watermarking - Attacks and Countermeasures","author":"N.F. Johnson","year":"2000","unstructured":"Johnson, N.F., Duric, Z., Jojodia, S.: Information Hiding: Steganography and Watermarking - Attacks and Countermeasures. Kluwer Academic, London (2000)"},{"key":"15_CR5","unstructured":"Arnold, M., Schmucker, M.: Techniques and Applications of Digital Water-marking and Content Protection. Artech House (2003)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steg-anography and Digital Watermarking. Artech House, London (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"15_CR7","unstructured":"Szepanski, W.: A Signal Theoretic Method for Creating Forgery proof Documents for Automatic Verification. In: Carnahan Conference on Crime Counter-measures, pp. 101\u2013109 (1979)"},{"key":"15_CR8","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, London (2002)"},{"key":"15_CR9","unstructured":"Lin, C.Y.: Watermarking and Digital Signature Techniques for Multimedia Au-thentication and Copyright Protection, PhD Thesis - Columbia University (2000)"},{"key":"15_CR10","unstructured":"Fan, Z., Hongbin, Z.: Capacity and Reliability of Digital Watermarking. In: Proceedings of the International conference on the Business of Electronic Product Reliability and Liability, pp. 162\u2013165 (2004)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Barni, M., Bartolini, F., De Rosa, A., Piva, A.: Capacity of the Watermark-Channel: How Many Bits Can Be Hidden Within a Digital Image? In: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol.\u00a03657, pp. 437\u2013448 (1999)","DOI":"10.1117\/12.344694"},{"key":"15_CR12","unstructured":"Ramkumar, M., Akansu, A.N.: A Capacity Estimate for Data Hiding in Inter-net Multimedia. In: Symposium on Content Security and Data Hiding in Digital Media (1999)"},{"key":"15_CR13","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal\u00a027, 373\u2013423 (1948)","journal-title":"Bell System Technical Journal"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"G. Langelaar","year":"2000","unstructured":"Langelaar, G., Setyawan, I., Lagendijk, R.: Watermarking digital image and video data: a state of the art overview. IEEE Signal Processing Magazine\u00a017, 20\u201346 (2000)","journal-title":"IEEE Signal Processing Magazine"},{"key":"15_CR15","unstructured":"Hern\u00e1ndez, J.R., P\u00e9rez-Gonz\u00e1lez, F.: Statistical Analysis of Watermarking Schemes for Copyright Protection of Images. Proceedings of IEEE, Special Issue: Identification and Protection of Multimedia Information, 1142\u20131166 (1999)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Inoue, H., Miyazaki, A., Katsura, T.: Wavelet-Based watermarking for Tamper Proofing of Still Images. In: IEEE International Conference on Image Processing, vol.\u00a02, pp. 88\u201391 (2000)","DOI":"10.1109\/ICIP.2000.899234"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Mohanty, S.P., Ramakrishnan, K.R., Kankanhalli, M.: A dual watermarking technique for images. In: Proceedings of the seventh ACM International Confer-ence on Multimedia, pp. 49\u201351 (1999)","DOI":"10.1145\/319878.319891"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M. Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., Piva, A.: Improved Wavelet Based Watermarking Through Pixel-Wise Masking. IEEE Trans. on Image Processing\u00a010, 783\u2013791 (2001)","journal-title":"IEEE Trans. on Image Processing"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1093\/ietfec\/e89-a.2.611","volume":"89","author":"G.F. Gui","year":"2006","unstructured":"Gui, G.F., Jiang, L.G., Chen, H.: A New Asymmetric Watermarking Scheme for Copyright Protection. IEICE Trans. Fundamentals\u00a089, 611\u2013614 (2006)","journal-title":"IEICE Trans. Fundamentals"},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/S0960-0779(02)00399-5","volume":"17","author":"A. Tefas","year":"2003","unstructured":"Tefas, A., Nikolaidis, A., Nikolaidis, N., Solachidis, V., Tsekeridou, S., Pitas, I.: Markov chaotic sequences for correlation based watermarking schemes. Proceedings of Chaos, Solitons and Fractals\u00a017, 567\u2013573 (2003)","journal-title":"Proceedings of Chaos, Solitons and Fractals"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Mooney, A., Keating, J.G.: An Optical and Digital Technique for Watermark Detection. In: Proceedings of SPIE International Symposium on Optical Science and Technology, vol.\u00a05202, pp. 97\u2013105 (2003)","DOI":"10.1117\/12.506092"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1016\/j.chaos.2006.05.073","volume":"35","author":"A. Mooney","year":"2008","unstructured":"Mooney, A., Keating, J.G., Pitas, I.: A Comparative Study of Chaotic and White Noise Signals in Digital Watermarking. Chaos, Solitons and Fractals\u00a035, 913\u2013921 (2008)","journal-title":"Chaos, Solitons and Fractals"},{"key":"15_CR23","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1147\/rd.402.0139","volume":"40","author":"F.C. Mintzer","year":"1996","unstructured":"Mintzer, F.C., et al.: Toward on-line, world-wide access to Vatican Library materials. IBM Journal of Research and Devel-opment\u00a040, 139\u2013162 (1996)","journal-title":"IBM Journal of Research and Devel-opment"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/35.739309","volume":"37","author":"F.C. Mintzer","year":"1998","unstructured":"Mintzer, F.C.: Developing Digital Libraries of Cultural Content for Internet Access. IEEE Communications Magazine\u00a037, 72\u201378 (1998)","journal-title":"IEEE Communications Magazine"},{"key":"15_CR25","unstructured":"Stewart, D., Lerner, E.A.: IBM- Think Research (Cited June 11, 2008), http:\/\/domino.watson.ibm.com\/comm\/wwwr_thinkresearch.nsf\/pages\/solutions299.html"},{"key":"15_CR26","unstructured":"Hu, Y., Kwong, S., Huang, J.: Using Invisible Watermarks to Protect Visible Watermarked Images. In: Proceedings of the IEEE International Conference on Circuit and Systems, vol.\u00a05, pp. 584\u2013587 (2004)"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F. Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of the IEEE\u00a087, 1079\u20131107 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Tefas, A., Nikolaidis, A., Nikolaidis, N., Solachidis, V., Tsekeridou, S., Pitas, I.: Performance Analysis of Watermarking Schemes based on Skew Tent Chaotic Sequences. In: NSIP 2001, vol.\u00a051, pp. 1979\u20131994 (2001)","DOI":"10.1109\/TSP.2003.811245"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Tsekeridou, S., Solachidis, V., Nikolaidis, N., Nikolaidis, A., Tefas, A., Pitas, I.: Bernoulli Shift Generated Watermarks: Theoretic Investigation. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, vol.\u00a03, pp. 1989\u20131992 (2001)","DOI":"10.1109\/ICASSP.2001.941338"},{"key":"15_CR30","unstructured":"Connor, F.R.: Noise: Introductory Topics in Electronics and Telecommunications, 2nd edn. Edward Arnold (1986)"},{"key":"15_CR31","unstructured":"Van Schyndel, R.G.: Digital Watermarking and Signal Delay Estimation Us-ing Pseudonoise Sequences. PhD thesis, School of Physics and Material Science, Monash University, Australia (2003)"},{"key":"15_CR32","volume-title":"A first course in Chaotic Dynamical Systems \u2013 Theory and Experiment","author":"R.L. Devaney","year":"1992","unstructured":"Devaney, R.L.: A first course in Chaotic Dynamical Systems \u2013 Theory and Experiment. Perseus Books, Cambridge (1992)"},{"key":"15_CR33","doi-asserted-by":"crossref","first-page":"13583","DOI":"10.1103\/PhysRevB.57.13583","volume":"57","author":"H.N. Nazareno","year":"1998","unstructured":"Nazareno, H.N., Gonzalez, J.A., Costa, I.F.: Propagating nature in chaotic systems. American Physical Society, Physical Review\u00a057, 13583\u201313588 (1998)","journal-title":"American Physical Society, Physical Review"},{"key":"15_CR34","unstructured":"Titchener, M.R., Ebeling, W.: Deterministic chaos and information theory. In: Proceedings of Data Compression Conference (2001)"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Xiang, H., Wang, L., Lin, H., Shi, J.: Digital watermarking systems with chaotic sequences. In: Proceedings of Security and Watermarking of Multimedia Contents, pp. 449\u2013457 (1999)","DOI":"10.1117\/12.344695"},{"key":"15_CR36","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.chaos.2003.12.104","volume":"22","author":"A. Dawei","year":"2004","unstructured":"Dawei, A., Guanrong, C., Wenbo, L.: A chaos based robust wavelet-domain watermarking algorithm. Chaos, Solitons and Fractals\u00a022, 47\u201354 (2004)","journal-title":"Chaos, Solitons and Fractals"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Mooney, A., Keating, J.G.: Generation and Detection of Watermarks Derived from Chaotic Function. In: Proceedings of Opto-Ireland. Proceedings SPIE, vol.\u00a05823, pp. 58\u201369 (2005)","DOI":"10.1117\/12.605983"},{"key":"15_CR38","volume-title":"Fractals, Chaos, Power Laws","author":"M. Schroeder","year":"1991","unstructured":"Schroeder, M.: Fractals, Chaos, Power Laws. Freeman and Company, New York (1991)"},{"key":"15_CR39","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1016\/j.chaos.2005.09.029","volume":"30","author":"A. Mooney","year":"2006","unstructured":"Mooney, A., Keating, J.G., Heffernan, D.M.: A Detailed Study of the Genera-tion of Optically Detectable Watermarks using the Logistic Map. Chaos, Solitons and Fractals\u00a030, 1088\u20131097 (2006)","journal-title":"Chaos, Solitons and Fractals"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Combining low-frequency and spread spectrum watermarking. In: Proceedings of SPIE Symposium on Optical Science, Engineering and Instru-mentation, vol.\u00a03456, pp. 2\u201312 (1998)","DOI":"10.1117\/12.330355"},{"key":"15_CR41","unstructured":"Woo, C.S., Du, J., Pham, B.: Performance factors analysis of a wavelet-based watermarking method. In: Proceedings of Australian Information Security Workshop, vol.\u00a044, pp. 89\u201398 (2005)"}],"container-title":["Studies in Computational Intelligence","Intelligent Computing Based on Chaos"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-95972-4_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T10:31:03Z","timestamp":1738924263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-95972-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540959717","9783540959724"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-95972-4_15","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}