{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:22:00Z","timestamp":1756462920563,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036873"},{"type":"electronic","value":"9783642036880"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_21","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T11:03:43Z","timestamp":1250507023000},"page":"227-240","source":"Crossref","is-referenced-by-count":11,"title":["Reading Watermarks from Printed Binary Images with a Camera Phone"],"prefix":"10.1007","author":[{"given":"Anu","family":"Pramila","sequence":"first","affiliation":[]},{"given":"Anja","family":"Keskinarkaus","sequence":"additional","affiliation":[]},{"given":"Tapio","family":"Sepp\u00e4nen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Kato, H., Tan, K.T.: 2D Barcodes for Mobile Phones. In: IEEE 2nd International Conference on Mobile Technology, Applications and Systems (2005)","DOI":"10.1109\/MTAS.2005.207166"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/11526858_7","volume-title":"Ubiquitous Computing Systems","author":"M. Rohs","year":"2005","unstructured":"Rohs, M.: Real-World Interaction with Camera Phones. In: Murakami, H., Nakashima, H., Tokuda, H., Yasumura, M. (eds.) UCS 2004. LNCS, vol.\u00a03598, pp. 74\u201389. Springer, Heidelberg (2005)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Perry, B., MacIntosh, B., Cushman, D.: Digimarc MediaBridge \u2013 The birth of a consumer product, from concept to commercial application. In: Security and Watermarking of multimedia Contents IV. Proc SPIE, vol.\u00a04675, pp. 118\u2013123 (2002)","DOI":"10.1117\/12.465267"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/1052380.1052396","volume-title":"Proc. of the 3rd International Conference on mobile and Ubiquitous Multimedia","author":"A. Katayama","year":"2004","unstructured":"Katayama, A., Nakamura, T., Yamamuro, M., Sonehara, N.: New high-speed frame detection method: Side trace algorithm (STA) for i-appli on cellular phones to detect watermarks. In: Proc. of the 3rd International Conference on mobile and Ubiquitous Multimedia, pp. 109\u2013116. ACM, New York (2004)"},{"key":"21_CR5","unstructured":"Pramila, A., Keskinarkaus, A., Sepp\u00e4nen, T.: Watermark robustness in the Print- Cam Process. In: IASTED International Conference on Signal Processing, Pattern and Applications, Innsbruck, Austria (2008)"},{"key":"21_CR6","unstructured":"Pramila, A., Keskinarkaus, A., Sepp\u00e4nen, T.: Camera based watermark extraction - Problems and examples. In: Finnish Signal Processing Symposium 2007 (FinSig 2007), Oulu, Finland, On CD (2007)"},{"key":"21_CR7","unstructured":"Lu, H., Shi, X., Shi, Y.Q., Kot, A., Chen, L.: Watermark embedding in DC components of DCT for Binary Images. In: IEEE Workshop on Multimedia Signal Processing, pp. 300\u2013303 (2002)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: IEEE International Conference on Multimedia and Expo, ICME 2000, vol.\u00a01, pp. 393\u2013396 (2000)","DOI":"10.1109\/ICME.2000.869623"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Chen, J., Chen, T.-S., Cheng, M.-V.: A new data hiding method in binary image. In: International Symposium on Multimedia Software Engineering, ISMSE 2003, p. 88 (2003)","DOI":"10.1109\/MMSE.2003.1254426"},{"key":"21_CR10","unstructured":"Pan, H.-K., Chen, Y.-Y., Tseng, Y.-C.: A secure data hiding scheme for two-color images. In: Fifth IEEE Symposium on computers and Communications, Proceedings, ISCC 2000, pp. 750\u2013755 (2000)"},{"issue":"4","key":"21_CR11","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TMM.2004.830814","volume":"6","author":"M. Wu","year":"2004","unstructured":"Wu, M., Liu, B.: Data Hiding in Binary Image for Authentication and Annotation. IEEE Transactions on Multimedia\u00a06(4), 528\u2013538 (2004)","journal-title":"IEEE Transactions on Multimedia"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Takeuchi, S., Kunisa, A., Tsujita, K., Inoue, Y.: Geometric distortion compensation of printed images containing inperceptible watermarks. In: International conference on cosumer Electronics, Digest of Technical paper, pp. 411\u2013421 (2005)","DOI":"10.1109\/ICCE.2005.1429892"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/11922162_13","volume-title":"Advances in Multimedia Information Processing - PCM 2006","author":"W.-G. Kim","year":"2006","unstructured":"Kim, W.-G., Lee, S.H., Seo, Y.S.: Image fingerprinting scheme for print-and-capture model. In: Zhuang, Y.-t., Yang, S.-Q., Rui, Y., He, Q. (eds.) PCM 2006. LNCS, vol.\u00a04261, pp. 106\u2013113. Springer, Heidelberg (2006)"},{"key":"21_CR14","unstructured":"Camera Calibration Toolbox for Generic Lenses. Matlab version 6.5 or later with the Image Processing Toolbox and Optimization Toolbox is required, http:\/\/www.ee.oulu.fi\/~jkannala\/calibration\/calibration.html (Retrieved, 12.12. 2008)"},{"issue":"8","key":"21_CR15","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TPAMI.2006.153","volume":"28","author":"J. Kannala","year":"2006","unstructured":"Kannala, J., Brandt, S.S.: A Generic Camera Model and Calibration Method for Conventional, Wide- Angle, and Fish-Eye Lenses. IEEE Transactions on pattern analysis and machine intelligence\u00a028(8), 1335\u20131340 (2006)","journal-title":"IEEE Transactions on pattern analysis and machine intelligence"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T19:30:20Z","timestamp":1739302220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}