{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:06Z","timestamp":1725535986881},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642030949"},{"type":"electronic","value":"9783642030956"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03095-6_24","type":"book-chapter","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T13:40:55Z","timestamp":1248961255000},"page":"234-241","source":"Crossref","is-referenced-by-count":1,"title":["Digital Image Watermarking for Malicious Attack"],"prefix":"10.1007","author":[{"given":"Wei-Hung","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yuh-Rau","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shi-Jinn","family":"Horng","sequence":"additional","affiliation":[]},{"given":"Tzong-Wann","family":"Kao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"24_CR1","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TIE.2004.841083","volume":"52","author":"T.H. Chen","year":"2005","unstructured":"Chen, T.H., Horng, G., Lee, W.B.: A publicly verifiable copyright-proving scheme resistant to malicious attacks. IEEE Trans. Industrial Electron.\u00a052(1), 327\u2013334 (2005)","journal-title":"IEEE Trans. Industrial Electron."},{"issue":"10","key":"24_CR2","doi-asserted-by":"publisher","first-page":"107002","DOI":"10.1117\/1.2361166","volume":"45","author":"D.C. Lou","year":"2006","unstructured":"Lou, D.C., Tso, H.K., Liu, J.L.: Robust copyright protection scheme for digital images using the low-band characteristic. Optical Engineering\u00a045(10), 107002\u2013107006 (2006)","journal-title":"Optical Engineering"},{"unstructured":"Haartsen, J.: Bluetooth-The universal radio interface for ad hoc wireless connectivity. Ericsson Review, 110\u2013117 (1998)","key":"24_CR3"},{"unstructured":"Petitcolas, F.A.P.: Weakness of existing watermark scheme (1997), \n                    \n                      http:\/\/www.petitcolas.net\/fabien\/watermarking\/stirmark\/index.html","key":"24_CR4"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03095-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T02:54:35Z","timestamp":1552100075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03095-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642030949","9783642030956"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03095-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}