{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:17:14Z","timestamp":1774797434410,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642036873","type":"print"},{"value":"9783642036880","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_24","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T07:03:43Z","timestamp":1250492623000},"page":"268-278","source":"Crossref","is-referenced-by-count":36,"title":["Fragile Watermarking Scheme with Extensive Content Restoration Capability"],"prefix":"10.1007","author":[{"given":"Xinpeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shuozhong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guorui","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"24_CR1","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/5.982406","volume":"90","author":"C. Vleeschouwer","year":"2002","unstructured":"Vleeschouwer, C., Delaigle, J.-F., Macq, B.: Invisibility and Application Functionalities in Perceptual Watermarking \u2014 An Overview. Proc. IEEE\u00a090(1), 64\u201377 (2002)","journal-title":"Proc. IEEE"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding \u2013 A Survey. Proc. IEEE\u00a087, 1062\u20131078 (1999)","journal-title":"Proc. IEEE"},{"issue":"10","key":"24_CR3","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"P.W. Wong","year":"2001","unstructured":"Wong, P.W., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. on Image Processing\u00a010(10), 1593\u20131601 (2001)","journal-title":"IEEE Trans. on Image Processing"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1016\/j.patrec.2004.08.017","volume":"25","author":"S. Suthaharan","year":"2004","unstructured":"Suthaharan, S.: Fragile Image Watermarking Using a Gradient Image for Improved Localization and Security. Pattern Recognition Letters\u00a025, 1893\u20131903 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"12","key":"24_CR5","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1049\/el:20030589","volume":"39","author":"H. Lu","year":"2003","unstructured":"Lu, H., Shen, R., Chung, F.-L.: Fragile Watermarking Scheme for Image Authentication. Electronics Letters\u00a039(12), 898\u2013900 (2003)","journal-title":"Electronics Letters"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/11922841_34","volume-title":"Digital Watermarking","author":"H. He","year":"2006","unstructured":"He, H., Zhang, J., Tai, H.-M.: A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 422\u2013432. Springer, Heidelberg (2006)"},{"issue":"2","key":"24_CR7","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1016\/j.amc.2006.07.036","volume":"185","author":"S.-H. Liu","year":"2007","unstructured":"Liu, S.-H., Yao, H.-X., Gao, W., Liu, Y.-L.: An Image Fragile Watermark Scheme Based on Chaotic Image Pattern and Pixel-Pairs. Applied Mathematics and Computation\u00a0185(2), 869\u2013882 (2007)","journal-title":"Applied Mathematics and Computation"},{"issue":"10","key":"24_CR8","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1109\/LSP.2007.896436","volume":"14","author":"X. Zhang","year":"2007","unstructured":"Zhang, X., Wang, S.: Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Processing Letters\u00a014(10), 727\u2013730 (2007)","journal-title":"IEEE Signal Processing Letters"},{"issue":"4","key":"24_CR9","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.sigpro.2008.10.001","volume":"89","author":"X. Zhang","year":"2009","unstructured":"Zhang, X., Wang, S.: Fragile Watermarking Scheme Using a Hierarchical Mechanism. Signal Processing\u00a089(4), 675\u2013679 (2009)","journal-title":"Signal Processing"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Images with Self-correcting Capabilities. In: Proceeding of IEEE International Conference on Image Processing, pp. 792\u2013796 (1999)","DOI":"10.1109\/ICIP.1999.817228"},{"issue":"5","key":"24_CR11","first-page":"515","volume":"22","author":"X. Zhu","year":"2007","unstructured":"Zhu, X., Hob, A., Marziliano, P.: A New Semi-Fragile Image Watermarking with Robust Tampering Restoration Using Irregular Sampling. Signal Processing: Image Communication\u00a022(5), 515\u2013528 (2007)","journal-title":"Signal Processing: Image Communication"},{"issue":"8","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TMM.2008.2007334","volume":"10","author":"X. Zhang","year":"2008","unstructured":"Zhang, X., Wang, S.: Fragile Watermarking with Error-Free Restoration Capability. IEEE Transactions on Multimedia\u00a010(8), 1490\u20131499 (2008)","journal-title":"IEEE Transactions on Multimedia"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T07:08:57Z","timestamp":1552115337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}