{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:03:05Z","timestamp":1772024585370,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642036873","type":"print"},{"value":"9783642036880","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_4","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T07:03:43Z","timestamp":1250492623000},"page":"4-13","source":"Crossref","is-referenced-by-count":3,"title":["Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model"],"prefix":"10.1007","author":[{"given":"H. Y.","family":"Leung","sequence":"first","affiliation":[]},{"given":"L. M.","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"L. L.","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Leung, H.Y., Cheng, L.M., Cheng, L.L.: A Robust Watermarking Scheme using Selective Curvelet Coefficients. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, pp. 465\u2013468 (2008)","DOI":"10.1109\/IIH-MSP.2008.234"},{"key":"4_CR2","first-page":"213","volume-title":"ICSE 2000","author":"R. Lutz","year":"2000","unstructured":"Lutz, R.: Software Engineering for Safety: A Roadmap, in The Future of Software Engineering. In: Finkelstein, A. (ed.) ICSE 2000, pp. 213\u2013224. ACM Press, New York (2000)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements by misuse cases. In: Proc. 37th Technology of Object-Oriented Languages and Systems (TOOLS-37 Pacific 2000), Sydney, Australia, pp. 120\u2013131 (2000)","DOI":"10.1109\/TOOLS.2000.891363"},{"key":"4_CR4","unstructured":"Hermann, D.S.: Software Safety and Reliability: Techniques, Approaches, and Standards of Key Industrial Sectors. Wiley-IEEE Computer Society Press (2000)"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1109\/32.730547","volume":"24","author":"N.E. Fenton","year":"1998","unstructured":"Fenton, N.E., Neil, M.: A strategy for improving safety related software engineering standards. IEEE Trans on Software Eng.\u00a024, 1002\u20131013 (1998)","journal-title":"IEEE Trans on Software Eng."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1002\/cpa.10116","volume":"57","author":"E.J. Candes","year":"2004","unstructured":"Candes, E.J., Donoho, D.L.: New tight frames of curvelets and optimal repesentations of objects with C2 singularities. Communications on Pure and Applied Mathematics\u00a057, 219\u2013266 (2004)","journal-title":"Communications on Pure and Applied Mathematics"},{"key":"4_CR7","unstructured":"Candes, E.J., Donoho, D.L.: Fast Discrete Curvelet Transform. Applied and Computational Mathmatics, California Institute of Technology, 1\u201343 (2005)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"He, K.-f., Gao, J., Hu, L.-m., Gao, H.-y.: Watermarking for images using the HVS and SVD in the wavelet domain. In: Proceedings of the 2006 IEEE International Conference on Mechatronics and Automation, pp. 2352\u20132356 (2006)","DOI":"10.1109\/ICMA.2006.257699"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Maity, S.P., Kundu, M.K.: An ImageWatermarking Scheme using HVS Characteristics and Spread Transform. In: Proceedings of the 17th International Conference on Pattern Recognition, vol.\u00a04, pp. 869\u2013871 (2004)","DOI":"10.1109\/ICPR.2004.1333910"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/S0165-1684(98)00013-9","volume":"66","author":"J.F. Delaigle","year":"1998","unstructured":"Delaigle, J.F., Vleeschouwer, C.D., Macq, B.: Watermarking Algorithm Based on A Human Visual Model. Signal Processing\u00a066, 319\u2013335 (1998)","journal-title":"Signal Processing"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"C.I. Podilchuk","year":"1998","unstructured":"Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications\u00a016, 525\u2013538 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Hannigan, B.T., Reed, A., Bradley, B.: Digital Watermarking Using Improved Human Visual System Model. In: Proc. SPIE Electronic Image, Security and Watermarking of Multimedia Content, San Jose, CA, vol.\u00a04314, pp. 468\u2013474 (2001)","DOI":"10.1117\/12.435430"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Taoa, P., Dexterb, S., Eskiciogluc, A.M.: Robust Digital Image Watermarking in Curvelet Domain. In: Proceedings of the SPIE, vol.\u00a06819, pp. 68191B\u201368191B-12 (2008)","DOI":"10.1117\/12.765895"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Cheng, L.M., Cheng, L.L.: A Robust Image Watermarking Scheme Based on A Novel HVS Model in Curvelet Domain. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, pp. 343\u2013346 (2008)","DOI":"10.1109\/IIH-MSP.2008.228"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/B978-0-12-189750-5.50016-6","volume-title":"Visual Perception","author":"T.N. Cornsweet","year":"1970","unstructured":"Cornsweet, T.N.: Visual Perception, ch.\u00a012, pp. 311\u2013364. Academic press, London (1970)"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TIT.1974.1055250","volume":"20","author":"J.L. Mannos","year":"1974","unstructured":"Mannos, J.L., Sarkrison, D.J.: The Effects of a Visual Fidelity Criterion on the Encoding of Images. IEEE Transactions on Information Theory\u00a020, 525\u2013536 (1974)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1113\/jphysiol.1966.sp008101","volume":"187","author":"F.W. Campbell","year":"1966","unstructured":"Campbell, F.W., Kulikowski, J.J., Levinson, J.: Orientational Selectivity of The Human Visual System. The Journal of Physiology\u00a0187, 437\u2013445 (1966)","journal-title":"The Journal of Physiology"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:38:27Z","timestamp":1558474707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}