{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:44Z","timestamp":1725538904288},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_15","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"170-183","source":"Crossref","is-referenced-by-count":1,"title":["Exposure Time Change Attack on Image Watermarking Systems"],"prefix":"10.1007","author":[{"given":"Kaituo","family":"Li","sequence":"first","affiliation":[]},{"given":"Dan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"De-ren","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1109\/TSP.2003.809383","volume":"51","author":"D. Kirovski","year":"2003","unstructured":"Kirovski, D., Petitcolas, F.: Blind pattern matching attack on watermarking systems. IEEE Transactions on Signal Processing\u00a051, 1045\u20131053 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-49380-8_20","volume-title":"Information Hiding","author":"M. Maes","year":"1998","unstructured":"Maes, M.: Twin peaks: the histogram attack to fixed depth image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 290\u2013305. Springer, Heidelberg (1998)"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing\u00a06, 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Xia, X., Boncelet, C., Arce, G.: A multiresolution watermark for digital images. In: Proceedings of the International Conference on Image Processing, vol.\u00a01 (1997)","DOI":"10.1109\/ICIP.1997.647971"},{"key":"15_CR5","volume-title":"Image watermarking and data hiding techniques. PhD thesis, Department of Electronic and Computer Engineering","author":"P. Wong","year":"2003","unstructured":"Wong, P.: Image watermarking and data hiding techniques. PhD thesis, Department of Electronic and Computer Engineering. The Hong Kong University of Science and Technology, Hong Kong, China (2003), http:\/\/www.ece.ust.hk\/~eepeter\/paperpdf\/Peter.PhD.Thesis.pdf"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Debevec, P., Malik, J.: Recovering high dynamic range radiance maps from photographs. In: Proceedings of the 24th Annual Conference on Computer Graphics and Interactive Techniques, pp. 369\u2013378 (1997)","DOI":"10.1145\/258734.258884"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/30.273657","volume":"40","author":"S. Bhukhanwala","year":"1994","unstructured":"Bhukhanwala, S., Ramabadran, T.: Automated global enhancement of digitized photographs. IEEE Transactions on Consumer Electronics\u00a040, 1\u201310 (1994)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing\u00a013, 600\u2013612 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.inffus.2006.04.001","volume":"8","author":"A. Ardeshir Goshtasby","year":"2007","unstructured":"Ardeshir Goshtasby, A., Nikolov, S.: Image fusion: advances in the state of the art. Information Fusion\u00a08, 114\u2013118 (2007)","journal-title":"Information Fusion"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/S1566-2535(03)00046-0","volume":"4","author":"G. Piella","year":"2003","unstructured":"Piella, G.: A general framework for multiresolution image fusion: from pixels to regions. Information Fusion\u00a04, 259\u2013280 (2003)","journal-title":"Information Fusion"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Burt, P.: The pyramid as a structure for efficient computation. Multiresolution Image Processing and Analysis\u00a035 (1984)","DOI":"10.1007\/978-3-642-51590-3_2"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1117\/1.601272","volume":"36","author":"S. Sims","year":"1997","unstructured":"Sims, S., Phillips, M.: Target signature consistency of image data fusion alternatives. Optical Engineering\u00a036, 743 (1997)","journal-title":"Optical Engineering"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/5.775414","volume":"87","author":"Z. Zhang","year":"1999","unstructured":"Zhang, Z., Blum, R.: A categorization of multiscale-decomposition-based image fusionschemes with a performance study for a digital camera application. Proceedings of the IEEE\u00a087, 1315\u20131326 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Rockinger, O., Fechner, T.: Pixel-level image fusion: the case of image sequences. In: Proceedings of the SPIE, vol.\u00a03374, pp. 378\u2013388 (1998)","DOI":"10.1117\/12.327135"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T23:26:52Z","timestamp":1685143612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}