{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:19:52Z","timestamp":1739423992098,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_32","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"379-387","source":"Crossref","is-referenced-by-count":10,"title":["Multiple Watermarking with Side Information"],"prefix":"10.1007","author":[{"given":"Jun","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Raval, M.S., Priti, P.R.: Discrete Wavelet Transform based Multiple Watermarking Scheme. In: 2003 Conference on Convergent Technologies for Asia-Pacific Region, vol.\u00a03, pp. 935\u2013938 (2003)","DOI":"10.1109\/TENCON.2003.1273384"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Fuhao, Z., Zhengding, L., Hefei, L.: A multiple watermarking algorithm based on CDMA technique. In: Proceedings of the 12th ACM International Conference on Multimedia, New York, pp. 424\u2013427 (2004)","DOI":"10.1145\/1027527.1027629"},{"issue":"6","key":"32_CR3","first-page":"1222","volume":"5","author":"Y.I. Khamlichi","year":"2006","unstructured":"Khamlichi, Y.I., Machkour, M., Afdel, K., Moudden, A.: Multiple watermark for tamper detection in mammography image. WSEAS Transactions on Computers\u00a05(6), 1222\u20131226 (2006)","journal-title":"WSEAS Transactions on Computers"},{"issue":"4","key":"32_CR4","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TMM.2007.893335","volume":"9","author":"G. Boato","year":"2007","unstructured":"Boato, G., Natale, D., Francesco, G.B., Fontanari, C.: Digital Image Tracing by Sequential Multiple Watermarking. IEEE Transactions on Multimedia\u00a09(4), 677\u2013686 (2007)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"4","key":"32_CR5","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1109\/TCSVT.2006.888837","volume":"17","author":"C.S. Lu","year":"2007","unstructured":"Lu, C.S., Hsu, C.Y.: Near-optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding. IEEE Transactions on Circuits and Systems for Video Technology\u00a017(4), 454\u2013467 (2007)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Mintzer, F., Braudaway, G.W.: If One Watermark Is Good, Are More Better? In: IEEE International Conference on Acoustics, Speech and Signal Processing, Phoenix, AZ, pp. 2067\u20132069 (1999)","DOI":"10.1109\/ICASSP.1999.758338"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Sheppard, N.P., Safavi-Naini, R., Ogunbona, P.: On Multiple Watermarking. In: Workshop on Multimedia and Security at ACM Multimedia, Ottawa, Ont, pp. 3\u20136 (2001)","DOI":"10.1145\/1232454.1232458"},{"key":"32_CR8","volume-title":"Information Theory and Coding","author":"J. Dan","year":"2004","unstructured":"Dan, J.: Information Theory and Coding, 2nd edn. University of Science and Technology of China Press, He Fei (2004)","edition":"2"},{"issue":"3","key":"32_CR9","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M. Costa","year":"1983","unstructured":"Costa, M.: Writing on Dirty Paper. IEEE Transactions on Information Theory\u00a029(3), 439\u2013441 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Shannon, C.E.: Channels with Side Information at the Transmitter. IBM Journal, 289\u2013293 (1958)","DOI":"10.1147\/rd.24.0289"},{"key":"32_CR11","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2001","unstructured":"Cox, I.J., Miller, M.L.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T12:12:48Z","timestamp":1739362368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}