{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:57Z","timestamp":1725538917612},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_8","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"88-102","source":"Crossref","is-referenced-by-count":2,"title":["Scale-Space Feature Based Image Watermarking in Contourlet Domain"],"prefix":"10.1007","author":[{"given":"Leida","family":"Li","sequence":"first","affiliation":[]},{"given":"Baolong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"Digital Watermarking","author":"I. Cox","year":"2001","unstructured":"Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Mateo (2001)"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MMUL.2005.46","volume":"12","author":"V. Licks","year":"2005","unstructured":"Licks, V., Jordan, R.: Geometric attacks on image watermarking systems. IEEE Multimedia\u00a012(3), 68\u201378 (2005)","journal-title":"IEEE Multimedia"},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1242471.1242473","volume":"39","author":"D. Zheng","year":"2007","unstructured":"Zheng, D., Liu, Y., Zhao, J., El-Saddik, A.: A survey of RST invariant image watermarking algorithms. ACM Comput. Surv.\u00a039(2), 1\u201391 (2007)","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"J. O\u2019Ruanaidh","year":"1998","unstructured":"O\u2019Ruanaidh, J., Pun, T.: Rotation, scale and translation invariant digital image watermarking. Signal Process\u00a066(3), 303\u2013317 (1998)","journal-title":"Signal Process"},{"issue":"5","key":"8_CR5","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C. Lin","year":"2001","unstructured":"Lin, C., Wu, M., Bloom, J., Cox, I., Miller, M., Lui, Y.: Rotation, scale, and translation resilient watermarking of images. IEEE Trans. Image Process.\u00a010(5), 767\u2013782 (2001)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"8_CR6","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TCSVT.2003.815959","volume":"13","author":"D. Zheng","year":"2003","unstructured":"Zheng, D., Zhao, J., El-Saddik, A.: RST-invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Trans. Circuits Syst. Video Technol.\u00a013(8), 753\u2013765 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"8_CR7","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TCSVT.2003.815955","volume":"13","author":"H. Kim","year":"2003","unstructured":"Kim, H., Lee, H.: Invariant image watermark using Zernike moments. IEEE Trans. Circuits Syst. Video Technol.\u00a013(8), 766\u2013775 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"8_CR8","doi-asserted-by":"publisher","first-page":"3740","DOI":"10.1016\/j.patcog.2007.05.004","volume":"40","author":"Y. Xin","year":"2007","unstructured":"Xin, Y., Liao, S., Pawlak, M.: Circularly orthogonal moments for geometrically robust image watermarking. Pattern Recognit.\u00a040(12), 3740\u20133752 (2007)","journal-title":"Pattern Recognit."},{"issue":"6","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/83.846253","volume":"9","author":"S. Pereira","year":"2000","unstructured":"Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process.\u00a09(6), 1123\u20131129 (2000)","journal-title":"IEEE Trans. Image Process."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kutter, M., Bhattacharjee, S., Ebrahimi, T.: Towards second generation watermarking schemes. In: Proc. IEEE Int. Conf. Image Process., Kobe, Japan, vol.\u00a01, pp. 320\u2013323 (1999)","DOI":"10.1109\/ICIP.1999.821622"},{"issue":"9","key":"8_CR11","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/TIP.2002.801587","volume":"11","author":"P. Bas","year":"2002","unstructured":"Bas, P., Chassery, J., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. Image Process.\u00a011(9), 1014\u20131028 (2002)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1016\/j.sigpro.2006.11.002","volume":"87","author":"X. Qi","year":"2007","unstructured":"Qi, X., Qi, J.: A robust content-based digital image watermarking scheme. Signal Process.\u00a087(6), 1264\u20131280 (2007)","journal-title":"Signal Process."},{"issue":"4","key":"8_CR13","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1109\/TSP.2003.809367","volume":"51","author":"C. Tang","year":"2003","unstructured":"Tang, C., Hang, H.: A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Process.\u00a051(4), 950\u2013959 (2003)","journal-title":"IEEE Trans. Signal Process."},{"issue":"7","key":"8_CR14","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.patcog.2003.12.013","volume":"37","author":"J. Seo","year":"2004","unstructured":"Seo, J., Yoo, C.: Localized image watermarking based on feature points of scale-space representation. Pattern Recognit.\u00a037(7), 1365\u20131375 (2004)","journal-title":"Pattern Recognit."},{"issue":"4","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1109\/TSP.2006.870581","volume":"54","author":"J. Seo","year":"2004","unstructured":"Seo, J., Yoo, C.: Image watermarking based on invariant regions of scale-space representation. IEEE Trans. Signal Process.\u00a054(4), 1537\u20131549 (2004)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"8_CR16","first-page":"1","volume":"45","author":"H. Lee","year":"2006","unstructured":"Lee, H., Kim, H., Lee, H.: Robust image watermarking using local invariant features. Opt. Eng.\u00a045(3), 037002(1-11) (2006)","journal-title":"Opt. Eng."},{"issue":"4","key":"8_CR17","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/TIFS.2007.908233","volume":"2","author":"X. Wang","year":"2007","unstructured":"Wang, X., Wu, J., Niu, P.: A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Trans. Inf. Forensics Security\u00a02(4), 655\u2013663 (2007)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"1","key":"8_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/B:VISI.0000027790.02288.f2","volume":"60","author":"K. Mikolajczyk","year":"2004","unstructured":"Mikolajczyk, K., Schmid, C.: Scale and affine invariant interest point detectors. Int. J. Comput. Vis.\u00a060(1), 63\u201386 (2004)","journal-title":"Int. J. Comput. Vis."},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D. Lowe","year":"2004","unstructured":"Lowe, D.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis.\u00a060(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"issue":"10","key":"8_CR20","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1109\/TIP.2006.877507","volume":"15","author":"A. Cunha","year":"2006","unstructured":"Cunha, A., Zhou, J., Do, M.: The nonsubsampled Contourlet transform: theory, design, and applications. IEEE Trans. Image Process.\u00a015(10), 3089\u20133101 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"8_CR21","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TIP.2004.823831","volume":"13","author":"M. Alghoniemy","year":"2004","unstructured":"Alghoniemy, M., Tewfik, A.: Geometric invariance in image watermarking. IEEE Trans. Image Process.\u00a013(2), 145\u2013153 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"8_CR22","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1117\/1.1384885","volume":"40","author":"G. Yu","year":"2001","unstructured":"Yu, G., Lu, C., Liao, H.: Mean-quantization-based fragile watermarking for image authentication. Opt. Eng.\u00a040(7), 1396\u20131408 (2001)","journal-title":"Opt. Eng."}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T00:56:43Z","timestamp":1552179403000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}