{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:51Z","timestamp":1725538911900},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_27","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"313-326","source":"Crossref","is-referenced-by-count":0,"title":["GSM Based Security Analysis for Add-SS Watermarking"],"prefix":"10.1007","author":[{"given":"Dong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Dah-Jye","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F. Cayre","year":"2005","unstructured":"Cayre, F., Fontaine, C., Furon, T.: Watermarking Security: Theory and Practice. IEEE Trans. Signal Processing\u00a053, 3976\u20133987 (2005)","journal-title":"IEEE Trans. Signal Processing"},{"key":"27_CR2","first-page":"5","volume":"9","author":"A. Kerckhoffs","year":"1983","unstructured":"Kerckhoffs, A.: La Cryptographie Militaire. Journal des Militaries\u00a09, 5\u201338 (1983)","journal-title":"Journal des Militaries"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/11558859_12","volume-title":"Information Hiding","author":"P. Comesa\u00f1a","year":"2005","unstructured":"Comesa\u00f1a, P., P\u00e9res-Freire, L., P\u00e9res-Gonz\u00e1lez, F.: Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 146\u2013160. Springer, Heidelberg (2005)"},{"key":"27_CR4","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Elsevier Science, Amsterdam (2002)"},{"issue":"4","key":"27_CR5","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TIFS.2006.885029","volume":"1","author":"L. P\u00e9rez-Freire","year":"2006","unstructured":"P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F., Furon, T., Comesa\u00f1a, P.: Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Trans. Information Forensics and Security\u00a01(4), 421\u2013439 (2006)","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-88961-8_10","volume-title":"Information Hiding","author":"J.Q. Ni","year":"2008","unstructured":"Ni, J.Q., Zhang, R.Y., Fang, C., Huang, J.W., Wang, C.T.: Watermarking Security Incorporating Natural Scene Statistics. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol.\u00a05284, pp. 132\u2013146. Springer, Heidelberg (2008)"},{"key":"27_CR7","first-page":"855","volume-title":"Advances in Neural Information Processing Systems (NIPS*99)","author":"M.J. Wainwright","year":"2000","unstructured":"Wainwright, M.J., Simoncelli, E.P.: Scale Mixtures of Gaussians and the Statistics of Natural Images. In: Advances in Neural Information Processing Systems (NIPS*99), vol.\u00a012, pp. 855\u2013861. MIT Press, Cambridge (2000)"},{"key":"27_CR8","volume-title":"Detection, Estimation, and Modulation Theory","author":"H.L. Trees van","year":"1968","unstructured":"van Trees, H.L.: Detection, Estimation, and Modulation Theory. John Wiley and Sons, Chichester (1968)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)","DOI":"10.1002\/0471200611"},{"issue":"11","key":"27_CR10","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1109\/TIP.2003.818640","volume":"12","author":"J. Portilla","year":"2003","unstructured":"Portilla, J., Strela, V., Wainwright, M.J., Simoncelli, E.P.: Image Denoising Using Scale Mixtures of Gaussians in the Wavelet Domain. IEEE Trans. On Image Processing\u00a012(11), 1338\u20131351 (2003)","journal-title":"IEEE Trans. On Image Processing"},{"issue":"11","key":"27_CR11","doi-asserted-by":"publisher","first-page":"2692","DOI":"10.1109\/78.650095","volume":"45","author":"S.I. Amari","year":"1997","unstructured":"Amari, S.I., Cardoso, J.F.: Blind Source Separation \u2013 Semiparametric Statistical Approach. IEEE Trans. Signal Processing\u00a045(11), 2692\u20132700 (1997), Special issue on neural networks","journal-title":"IEEE Trans. Signal Processing"},{"issue":"7","key":"27_CR12","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/97.700921","volume":"5","author":"P. Stoica","year":"1998","unstructured":"Stoica, P., Ng, B.C.: On the Craner-Rao Bound Under Parametric Constraints. IEEE Signal Processing Lett.\u00a05(7), 177\u2013179 (1998)","journal-title":"IEEE Signal Processing Lett."},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1109\/TCOMM.1994.580247","volume":"42","author":"N.A. D\u2019Andrea","year":"1994","unstructured":"D\u2019Andrea, N.A., Mengli, U., Reggiannini, R.: The Modified Carmer-Rao Bound and its Application to Synchronization Problems. IEEE Trans. Commun.\u00a042, 1391\u20131399 (1994)","journal-title":"IEEE Trans. Commun."},{"key":"27_CR14","unstructured":"Chou, Y.-l.: Statistical Analysis, Holt International (1969)"},{"issue":"1","key":"27_CR15","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/26.655403","volume":"46","author":"F. Gini","year":"1998","unstructured":"Gini, F., Reggiannini, R., Mengali, U.: The Modified Cramer-Rao Bound in Vector Parameter Estimation. IEEE Trans. Commun.\u00a046(1), 52\u201360 (1998)","journal-title":"IEEE Trans. Commun."}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:37:03Z","timestamp":1558564623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}