{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:46:27Z","timestamp":1725536787519},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036873"},{"type":"electronic","value":"9783642036880"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_25","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T11:03:43Z","timestamp":1250507023000},"page":"279-293","source":"Crossref","is-referenced-by-count":3,"title":["Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking"],"prefix":"10.1007","author":[{"given":"Kazuya","family":"Ohkita","sequence":"first","affiliation":[]},{"given":"Maki","family":"Yoshida","sequence":"additional","affiliation":[]},{"given":"Itaru","family":"Kitamura","sequence":"additional","affiliation":[]},{"given":"Toru","family":"Fujiwara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.patcog.2006.05.018","volume":"40","author":"C.S. Chana","year":"2007","unstructured":"Chana, C.S., Changb, C.C.: An Efficient Image Authentication Method Based on Hamming Code. Pattern Recognition\u00a040(2), 681\u2013690 (2007)","journal-title":"Pattern Recognition"},{"key":"25_CR2","unstructured":"Hassan, M.H., Gilani, S.A.M.: A Semi-Fragile Watermarking Scheme for Color Image Authentication. Trans. Engineering, Computing and Technology\u00a013 (2006)"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/11922841_34","volume-title":"Digital Watermarking","author":"H. He","year":"2006","unstructured":"He, H., Zhang, J., Tai, H.M.: A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 422\u2013432. Springer, Heidelberg (2006)"},{"issue":"3","key":"25_CR4","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1109\/TIFS.2008.926994","volume":"3","author":"A.T.S. Ho","year":"2008","unstructured":"Ho, A.T.S., Zhu, X., Shen, J., Marziliano, P.: Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform. IEEE Trans. Information Forensics and Security\u00a03(3), 567\u2013569 (2008)","journal-title":"IEEE Trans. Information Forensics and Security"},{"issue":"2","key":"25_CR5","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1016\/j.amc.2006.07.036","volume":"185","author":"S.H. Liu","year":"2007","unstructured":"Liu, S.H., Yao, H.X., Gao, W., Liu, Y.L.: An Image Fragile Watermarking Scheme Based on Chaotic Image Pattern and Pixel-Pairs. Applied Mathematics and Computation\u00a0185(2), 869\u2013882 (2007)","journal-title":"Applied Mathematics and Computation"},{"issue":"3","key":"25_CR6","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.csi.2007.08.002","volume":"30","author":"W. Lu","year":"2008","unstructured":"Lu, W., Chung, F.L., Lu, H., Choi, K.S.: Detecting Fake Images Using Watermarks and Support Vector Machines. Computer Standards and Interfaces\u00a030(3), 132\u2013136 (2008)","journal-title":"Computer Standards and Interfaces"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Sang, J., Alam, M.S.: Fragility and Robustness of Binary-Phase-Only-Filter-Based Fragile\/Semifragile Digital Image Watermarking. IEEE Trans. Instrumentation and Measurement\u00a057(3) (2008)","DOI":"10.1109\/TIM.2007.911585"},{"key":"25_CR8","series-title":"Standards and Practice","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0799-4","volume-title":"JPEG2000 Image Compression Fundamentals","author":"D.S. Taubman","year":"2002","unstructured":"Taubman, D.S., Marcellin, M.W.: JPEG2000 Image Compression Fundamentals. Standards and Practice. Kluwer Academic Publishers, Boston (2002)"},{"key":"25_CR9","unstructured":"Wu, J., Zhu, B.B., Li, S., Lin, F.: A Secure Image Authentication Algorithm with Pixel-level Tamper Localization. In: Proc. of Int.\u00a0Conf. on Image Process, vol.\u00a03, pp. 301\u2013306 (2004)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Xiao, J., Wang, Y.: A Semi-fragile Watermarking Tolerant of Laplacian Sharpening. In: Int.\u00a0Conf. on Computer Science and Software Engineering, vol.\u00a03, pp. 579\u2013582 (2008)","DOI":"10.1109\/CSSE.2008.331"},{"issue":"10","key":"25_CR11","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1109\/LSP.2007.896436","volume":"14","author":"X. Zhang","year":"2007","unstructured":"Zhang, X., Wang, S.: Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Process. Lett.\u00a014(10), 727\u2013730 (2007)","journal-title":"IEEE Signal Process. Lett."},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wang, S.: Fragile Watermarking with Error-Free Restoration Capability. IEEE Trans. Multimedia\u00a010(8) (2008)","DOI":"10.1109\/TMM.2008.2007334"},{"issue":"4","key":"25_CR13","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.sigpro.2008.10.001","volume":"89","author":"X. Zhang","year":"2009","unstructured":"Zhang, X., Wang, S.: Fragile Watermarking Scheme Using a Hierarchical Mechanism. Signal Processing\u00a089(4), 675\u2013679 (2009)","journal-title":"Signal Processing"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T01:38:12Z","timestamp":1558489092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}