{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:58Z","timestamp":1725538918126},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_10","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"113-123","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive SVD-Based Digital Image Watermarking"],"prefix":"10.1007","author":[{"given":"Maliheh","family":"Shirvanian","sequence":"first","affiliation":[]},{"given":"Farah","family":"Torkamani Azar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Darmstaedter, V., Delaigle, J.F., Quisquater, J.J., Macq, B.: Low Cost Spatial Watermarking. Computers & Graphics\u00a022(4) (1998)","DOI":"10.1016\/S0097-8493(98)00031-4"},{"key":"10_CR2","unstructured":"Kimpan, S., Lasakul, A., Kimpan, C.: Adaptive Watermarking in Spatial Domain for Still Images. In: Proceedings of the International Conference on Information and Knowledge Engineering (2004)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Nikolaidis, N., Pitas, I.: Robust Image Watermarking in the Spatial Domain. In: European Association for Signal Processing (EURASIP), vol.\u00a066(3) (1998)","DOI":"10.1016\/S0165-1684(98)00017-6"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum for Multimedia. IEEE Trans. on Image Processing\u00a06(12) (1997)","DOI":"10.1109\/83.650120"},{"key":"10_CR5","unstructured":"Guo, H., Georganas, N.D.: Digital Image Watermarking for Joint Ownership Verification without a Trusted Dealer. In: Proc. IEEE ICME 2003, Baltimore, USA (2003)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/3-540-36617-2_19","volume-title":"Digital Watermarking","author":"Y.J. Jung","year":"2003","unstructured":"Jung, Y.J., Hahn, M., Ro, Y.M.: Spatial Frequency Band Division in Human Visual System Based-Watermarking. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol.\u00a02613, pp. 224\u2013234. Springer, Heidelberg (2003)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-36617-2_6","volume-title":"Digital Watermarking","author":"D. Yu","year":"2003","unstructured":"Yu, D., Sattar, F.: A New Blind Watermarking Technique Based on Independent Component Analysis. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol.\u00a02613, pp. 51\u201363. Springer, Heidelberg (2003)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Guitart Pla, O., Lin, E.T., Delp, E.J.: A Wavelet Watermarking Algorithm Based on a Tree Structure. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, vol.\u00a05306 (2004)","DOI":"10.1117\/12.531459"},{"key":"10_CR9","unstructured":"Hu, A.T.S., Chow, A.K.K., Woon, J.: Robust Digital Image-in-Image Watermarking Algorithm Using the Fast Hadamard Transform. In: IEEE International Symposium on Circuits and Systems, Thailand, vol.\u00a03 (2003)"},{"key":"10_CR10","unstructured":"Ganic, E., Zubair, N., Eskicioglu, A.M.: An Optimal Watermarking Scheme Based on Singular Value Decomposition. In: Proceedings of the IASTED International Conference on Communication, Network, and Information Security (CNIS 2003), Uniondale, NY (2003)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Liu, R.Z., Tan, T.N.: SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Trans. on Multimedia\u00a04(1) (2002)","DOI":"10.1109\/6046.985560"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Chandra, D.V.S.: Digital image watermarking using singular value decomposition. In: Proceedings of 45th IEEE Midwest Symposium on Circuits and Systems, Tulsa OK (2002)","DOI":"10.1109\/MWSCAS.2002.1187023"},{"key":"10_CR13","unstructured":"Ganic, E., Eskicioglu, A.M.: Robust Embedding Of Visual Watermarks Using DWT-SVD. Journal of Electronic Imaging, 1\u201313 (2005)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Gorodetskii, V.I., Samoilov, V.I.: Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel. In: Proceedings of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM\u2013ACNS, Russia (2003)","DOI":"10.1007\/978-3-540-45215-7_30"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Smith, J.R., Chang, S.F.: Quadtree Segmentation for Texture-Based Image Query. In: Proc. ACM Intern. Conf. Multimedia, San Francisco, CA (1994)","DOI":"10.1145\/192593.192676"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Remias, E., Sheikholeslami, G., Zhang, A.: Block-Oriented Image Decomposition and Retrieval in Image Database Systems. In: The 1996 International Workshop on Multi-media Database Management Systems, New York (1996)","DOI":"10.1109\/MMDBMS.1996.541858"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Kutter, M., Petitcolas, F.A.P.: Fair Evaluation Methods for Image Watermarking Systems. Journal of Electronic Imaging\u00a09(4) (2000)","DOI":"10.1117\/1.1287594"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A.P., Anderson, R.J.: Evaluation of Copyright Marking Systems. In: IEEE Multimedia Systems 1999, Italy (1999)","DOI":"10.1109\/MMCS.1999.779264"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:37:13Z","timestamp":1558564633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}