{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:51:23Z","timestamp":1725551483374},"publisher-location":"Berlin, Heidelberg","reference-count":92,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117541"},{"type":"electronic","value":"9783642117565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11756-5_15","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T00:08:43Z","timestamp":1270598923000},"page":"337-364","source":"Crossref","is-referenced-by-count":9,"title":["An Introduction to Robust Transform Based Image Watermarking Techniques"],"prefix":"10.1007","author":[{"given":"Xi","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Anthony T. S.","family":"Ho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Oxford Economics, Economic impact of legislative reform to reduce audio-visual piracy (2009), http:\/\/www.bva.org.uk\/files\/images\/AV_Piracy_Final_Report_-_FINAL.pdf (accessed June 28, 2009)"},{"key":"15_CR2","unstructured":"The independent, P2P geek caught in $29m music copyright scrap (2009), http:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/p2p-geek-caught-in-29m-music-copyright-scrap-1701449.html (accessed June 28, 2009)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Zheng, D., Liu, Y., Zhao, J., et al.: A survey of RST invariant image watermarking algorithms. ACM Computing Surveys (2007), doi:10.1145\/1242471.1242473","DOI":"10.1145\/1242471.1242473"},{"key":"15_CR4","unstructured":"Department for Culture, Media and Sport, The impact of new technologies on the music industry (2009), http:\/\/www.culture.gov.uk\/images\/publications\/consumerscalltune.pdf (accessed June 28, 2009)"},{"key":"15_CR5","unstructured":"Department for Culture, Media and Sport, UK film council response to digital Britain: The Interim Report (2009), http:\/\/www.culture.gov.uk\/images\/publications\/UKFilmCouncil_DBIRResponse.pdf (accessed June 28, 2009)"},{"key":"15_CR6","unstructured":"Hunter, D.: Papermaking: The History and Technique of an Ancient Craft. Gannon Distributing Co. (1978)"},{"key":"15_CR7","volume-title":"Digital watermarking and Steganography","author":"I.J. Cox","year":"2008","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., et al.: Digital watermarking and Steganography, 2nd edn. Morgan Kaufmann, USA (2008)","edition":"2"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, J., Ho, A.T.S., Qiu, G., et al.: Robust video watermarking of H.264\/AVC. IEEE Trans. on Circuits and Systems (2007), doi:10.1109\/TCSII.2006.886247","DOI":"10.1109\/TCSII.2006.886247"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Noorkami, M., Merserau, R.M.: A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance. IEEE Trans. on Information Forensics and Security (2007), doi:10.1109\/TIFS.2006.890306","DOI":"10.1109\/TIFS.2006.890306"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Gong, X., Lu, H.M.: Towards Fast and Robust Watermarking Scheme for H.264 Video. In: 10th IEEE International Symposium on Multimedia (2008), doi:10.1109\/ISM.2008.16","DOI":"10.1109\/ISM.2008.16"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Malvar, H.S.: Spread-Spectrum Watermarking of Audio Signals. IEEE Transactions on Signal Processing (2003), doi:10.1109\/TSP.2003.809384","DOI":"10.1109\/TSP.2003.809384"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Kumsawat, P., Attakitmongcol, K., Srikaew, A.: A robust audio watermarking based-on multiwavelet transform. In: International Symposium on Intelligent Signal Processing and Communications Systems, ISPACS 2008 (2009), doi:10.1109\/ISPACS.2009.4806664","DOI":"10.1109\/ISPACS.2009.4806664"},{"issue":"12","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., et al.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. on Image Processing"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Duan, G., Ho, A.T.S., Zhao, X.: A novel non-redundant contourlet transform for robust image watermarking against non-geometrical and geometrical attacks. In: Proc. IET 5th International Conference on Visual Information Engineering (2008), doi:10.1049\/cp:20080295","DOI":"10.1049\/cp:20080295"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Yang, E.H.: Joint robust watermarking and compression using variable-rate scalar quantization. In: Canadian Workshop on Information Theory, CWIT 2009 (2009), doi:10.1109\/CWIT.2009.5069550","DOI":"10.1109\/CWIT.2009.5069550"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Luo, H., Zhao, Z., Huang, J., et al.: Halftone Image Watermarking Based on the Binary Pseudo-Wavelet Transform. In: Proc. 3rd International Conference on International Information Hiding and Multimedia Signal Processing (2007), doi:10.1109\/IIHMSP.2007.4457549","DOI":"10.1109\/IIHMSP.2007.4457549"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Hsieh, C.T., Wu, Y.K., Chung, W.J.: Digital watermarking system for halftone images based on particle swarm optimization. In: 1st IEEE International Conference on Ubi-Media Computing (2008), doi:10.1109\/UMEDIA.2008.4570890","DOI":"10.1109\/UMEDIA.2008.4570890"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-642-01757-5_4","volume-title":"Transactions on DHMS IV","author":"W. Jiang","year":"2009","unstructured":"Jiang, W., Ho, A.T.S., Treharne, H.: A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics. In: Shi, Y.Q. (ed.) Transactions on DHMS IV. LNCS, vol.\u00a05510, pp. 65\u201383. Springer, Heidelberg (2009)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Qadir, M.A., Ahmad, I.: Digital Text Watermarking: Secure Content Delivery and Data Hiding in Digital Documents. In: 39th Annual 2005 International Carnahan Conference on Security Technology, CCST 2005 (2005), doi:10.1109\/MAES.2006.284353","DOI":"10.1109\/MAES.2006.284353"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-92238-4_14","volume-title":"Digital Watermarking","author":"C. Culnane","year":"2008","unstructured":"Culnane, C., Treharne, H., Ho, A.T.S.: Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol.\u00a05041, pp. 173\u2013187. Springer, Heidelberg (2008)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Zafeiriou, S., Tefas, A., Pitas, I.: Blind robust watermarking schemes for copyright protection of 3D mesh objects. IEEE Trans. on Visualization and Computer (2005), doi:10.1109\/TVCG.2005.71","DOI":"10.1109\/TVCG.2005.71"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Motwani, R., Ambardekar, A., Motwani, M., et al.: Robust watermarking of 3D skinning mesh animations. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2008 (2008), doi:10.1109\/ICASSP.2008.4517969","DOI":"10.1109\/ICASSP.2008.4517969"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Hu, R., Rohao-Alface, P., Macq, B.: Constrained optimisation of 3D polygonal mesh watermarking by quadratic programming. In: IEEE International Conference Acoustics, Speech and Signal Processing, ICASSP 2009 (2009), doi:10.1109\/ICASSP.2009.4959880","DOI":"10.1109\/ICASSP.2009.4959880"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Cheng, C.J., Lin, L.C., Dai, W.T.: Construction and detection of digital holographic watermarks. Optics Communications (2005), doi:10.1016\/j.optcom.2004.12.010","DOI":"10.1016\/j.optcom.2004.12.010"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Lin, L.C., Chen, C.L.: Statistical detection of digital holographic watermarking system. Optics Communications (2008), doi:10.1016\/j.optcom.2008.04.065","DOI":"10.1016\/j.optcom.2008.04.065"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Huang, S., Wu, J.K.: Optical watermarking for printed document authentication. IEEE Trans. on Information Forensics and Security (2007), doi:10.1109\/TIFS.2007.897255","DOI":"10.1109\/TIFS.2007.897255"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Lu, Y., Li, X., Qi, W., et al.: A further study on an optical watermarking scheme. IEEE Signal Processing (2008), doi:10.1109\/ICOSP.2008.4697588","DOI":"10.1109\/ICOSP.2008.4697588"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, J., Kou, W., Fan, K.: Secure buyer-seller watermarking protocol. IEE Proceedings Information Security (2006), doi:10.1049\/ip-ifs:20055069","DOI":"10.1049\/ip-ifs:20055069"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys and Tutorials (2007), doi:10.1109\/COMST.2007.4317620","DOI":"10.1109\/COMST.2007.4317620"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Ho, A.T.S., Zhu, X., Shen, J., et al.: Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform. IEEE Transactions, Information Forensics and Security (2008), doi:10.1109\/TIFS.2008.926994","DOI":"10.1109\/TIFS.2008.926994"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Izquierdo, E.: Fragile watermarking for image authentication. In: Furht, B. (ed.) Multimedia Security Handbook. CRC Press, Boca Raton (2005)","DOI":"10.1201\/9781420038262.ch12"},{"key":"15_CR32","unstructured":"Alomari, R., Al-Jaber, A.: A Fragile watermarking algorithm for content authentication. International Journal of Computing and Information Science\u00a02(1) (2004)"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Byun, S., Lee, I., Shin, T.: A public key based watermarking for color image authentication. In: IEEE international conference on multimedia and expo. (2002), doi:10.1109\/ICME.2002.1035851","DOI":"10.1109\/ICME.2002.1035851"},{"key":"15_CR34","unstructured":"Fridrich, J.: Methods for tamper detection in digital images. In: The multimedia and security workshop at ACM multimedia (1999)"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Kundur, D., Hatzinakos, D.: A robust digital image watermarking method using wavelet-based fusion. In: Proc. International Conference Image Processing (1997), doi:10.1109\/ICIP.1997.647970","DOI":"10.1109\/ICIP.1997.647970"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Ho, C.K., Li, C.T.: Semi-Fragile Watermarking Scheme for Authentication of JPEG Images. In: International Conference on Information Technology: Coding and Computing (2004), doi:10.1109\/ITCC.2004.1286417","DOI":"10.1109\/ITCC.2004.1286417"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Zhu, X., Ho, A.T.S., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Elsevier Signal Processing, Image Communication (2007), doi:10.1016\/j.image.2007.03.004","DOI":"10.1016\/j.image.2007.03.004"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing (2002), doi:10.1155\/S1110865702204047","DOI":"10.1155\/S1110865702204047"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Bartolini, F., Tefas, A., Barni, M., et al.: Image authentication techniques for surveillance applications. Proc. of IEEE (2001), doi:10.1109\/5.959338","DOI":"10.1109\/5.959338"},{"key":"15_CR40","volume-title":"Digital video image quality and perceptual coding","author":"H.R. Wu","year":"2005","unstructured":"Wu, H.R., Rao, K.R.: Digital video image quality and perceptual coding. CRC Press, Boca Raton (2005)"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Gerhard, D.B., Kinsner, W.: Lossy compression of head and shoulder images using zerotrees of wavelet coefficients. In: Canadian Conference on Electrical and Computer Engineering (1996), doi:10.1109\/CCECE.1996.548129","DOI":"10.1109\/CCECE.1996.548129"},{"key":"15_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/10719724_16","volume-title":"Information Hiding","author":"S. Voloshynovskiy","year":"2000","unstructured":"Voloshynovskiy, S., Herrigel, A., Baumgaertner, N., et al.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 211\u2013236. Springer, Heidelberg (2000)"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing (2004), doi:10.1109\/TIP.2003.819861","DOI":"10.1109\/TIP.2003.819861"},{"key":"15_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-540-24624-4_21","volume-title":"Digital Watermarking","author":"B. Abdel-Aziz","year":"2004","unstructured":"Abdel-Aziz, B., Chouinard, J.-Y.: On perceptual quality of watermarked images - an experimental approach. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 277\u2013288. Springer, Heidelberg (2004)"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Kalker, T.: Considerations on watermarking security. In: IEEE Fourth Workshop on Multimedia Signal Processing (2001), doi:10.1109\/MMSP.2001.962734","DOI":"10.1109\/MMSP.2001.962734"},{"key":"15_CR46","doi-asserted-by":"crossref","unstructured":"Perez-Freire, L., Perez-Gonzalez, F.: Spread-Spectrum Watermarking Security. IEEE Trans. on Information Forensics and Security (2009), doi:10.1109\/TIFS.2008.2009603","DOI":"10.1109\/TIFS.2008.2009603"},{"key":"15_CR47","volume-title":"A general framework for robust watermarking security","author":"M. Barni","year":"2003","unstructured":"Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Elsevier, North-Holland, Inc., Amsterdam (2003)"},{"key":"15_CR48","doi-asserted-by":"crossref","unstructured":"Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Trans. on Signal Processing (2005), doi:10.1109\/TSP.2005.855418","DOI":"10.1109\/TSP.2005.855418"},{"key":"15_CR49","unstructured":"Fei, C., Kundur, D., Kwong, R.H.: Analysis and design of secure watermark-based authentication systems. IEEE Trans. on Information Forensics and Security (2006), doi:0.1109\/TIFS.2005.863505"},{"key":"15_CR50","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/ICIP.1994.413536","volume":"2","author":"R.G. Schyndel Van","year":"1994","unstructured":"Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. IEEE Int. Conf. on image processing\u00a02, 86\u201390 (1994)","journal-title":"IEEE Int. Conf. on image processing"},{"key":"15_CR51","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 691\u2013700 (2002)","DOI":"10.1117\/12.465330"},{"key":"15_CR52","doi-asserted-by":"crossref","DOI":"10.1201\/9780203903896","volume-title":"Pattern Recognition and Image Preprocessing","author":"S.T. Bow","year":"2002","unstructured":"Bow, S.T.: Pattern Recognition and Image Preprocessing. CRC Press, Boca Raton (2002)"},{"key":"15_CR53","volume-title":"Multimedia Watermarking Techniques and Applications","author":"E. Muharemagic","year":"2006","unstructured":"Muharemagic, E., Furht, B.: Survey of Watermarking Techniques and Applications. In: Multimedia Watermarking Techniques and Applications. CRC Press, Boca Raton (2006)"},{"key":"15_CR54","doi-asserted-by":"crossref","unstructured":"Luo, K., Tian, X.: A New Robust Watermarking Scheme based on Wavelet Transform. In: 2008 Congress on Image and Signal Processing (2008), doi:10.1109\/CISP.2008.739","DOI":"10.1109\/CISP.2008.739"},{"key":"15_CR55","doi-asserted-by":"crossref","unstructured":"Ho, A.T.S., Zhu, X., Guan, Y., et al.: Slant transform watermarking for textured images. In: Proc. 2004 International Symposium on Circuits and Systems (2004), ISBN: 078038251X","DOI":"10.1109\/ISCAS.2004.1329904"},{"key":"15_CR56","doi-asserted-by":"crossref","unstructured":"Kang, K., Huang, J., Shi, Y., et al.: A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression. IEEE Trans. on circuits and systems for video technology (2003), doi:10.1109\/TCSVT.2003.815957","DOI":"10.1109\/TCSVT.2003.815957"},{"key":"15_CR57","doi-asserted-by":"crossref","unstructured":"Wu, J., Sun, Z.: Robust Detection of DCT-domain Watermarks Using Alpha-stable Models. In: 4th IEEE Conference on Industrial Electronics and Applications (2009), doi:10.1109\/ICIEA.2009.5138913","DOI":"10.1109\/ICIEA.2009.5138913"},{"key":"15_CR58","doi-asserted-by":"crossref","unstructured":"Al-Gindy, A.N., Tawfik, A., Al Ahmad, H., et al.: A New Blind Image Watermarking Technique for Dual Watermarks Using Low-Frequency Band DCT Coefficients. In: 14th IEEE International Conference on Electronics, Circuits and Systems (2007), doi:10.1109\/ICECS.2007.4511047","DOI":"10.1109\/ICECS.2007.4511047"},{"key":"15_CR59","unstructured":"Kay, S., Izquierdo, E.: Robust content based image watermarking. In: Proc. the Workshop on Image Analysis for Multimedia Interactive Services (2001)"},{"key":"15_CR60","doi-asserted-by":"crossref","unstructured":"Hernandez, J.R., Perez-Gonzalez, F., Amado, M., et al.: DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure. IEEE Trans. on Image Processing (2000), doi:10.1109\/83.817598","DOI":"10.1109\/83.817598"},{"key":"15_CR61","doi-asserted-by":"crossref","unstructured":"Podilchuk, C.I., Zeng, W.: Image-Adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications (1998), doi:10.1109\/49.668975","DOI":"10.1109\/49.668975"},{"key":"15_CR62","doi-asserted-by":"crossref","unstructured":"Li, Q., Cox, I.J.: Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking. IEEE Trans. on Information Forensics and Security (2007), doi:10.1109\/TIFS.2007.897266","DOI":"10.1109\/TIFS.2007.897266"},{"key":"15_CR63","doi-asserted-by":"crossref","unstructured":"Li, Y., Zhu, H., Yu, R., et al.: An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watsons Visual Model. In: 2008 International Symposium on Electronic Commerce and Security (2008), doi:10.1109\/ISECS.2008.83","DOI":"10.1109\/ISECS.2008.83"},{"key":"15_CR64","doi-asserted-by":"crossref","unstructured":"Wong, P.H.W., Au, O.C., Yeung, Y.M.: A Novel Blind Multiple Watermarking Technique for Images. IEEE Trans. on Circuits and Systems for Video Technology (2003), doi:10.1109\/TCSVT.2003.815948","DOI":"10.1109\/TCSVT.2003.815948"},{"key":"15_CR65","doi-asserted-by":"crossref","unstructured":"Dong, P., Brankov, J.G., Galatsanos, N.P., et al.: Digital Watermarking Robust to Geometric Distortions. IEEE Trans. on Image Processing (2005), doi:10.1109\/TIP.2005.857263","DOI":"10.1109\/TIP.2005.857263"},{"key":"15_CR66","doi-asserted-by":"crossref","unstructured":"Yeo, I.K., Kim, H.J.: Generalized patchwork algorithm for image watermarking. Journal of Multimedia Systems (2003), doi:10.1007\/s00530-003-0097-0","DOI":"10.1007\/s00530-003-0097-0"},{"key":"15_CR67","doi-asserted-by":"crossref","unstructured":"Ho, A.T.S., Shen, J., Chow, K.K., et al.: Robust Digital Image-in-Image Watermarking Algorithm Using the Fast Hadamard Transform. In: 2003 IEEE International Symposium on Circuits and Systems (2003), doi:10.1117\/12.451250","DOI":"10.1117\/12.451250"},{"key":"15_CR68","doi-asserted-by":"crossref","unstructured":"Calagna, M., Guo, H., Mancini, L., et al.: A robust watermarking system based on SVD compression. In: Proc. The Symposium on Applied Computing (2006), doi:10.1145\/1141277.1141590","DOI":"10.1145\/1141277.1141590"},{"key":"15_CR69","doi-asserted-by":"crossref","unstructured":"Tao, P., Dexterb, S., Eskicioglu, A.M.: Robust Digital Image Watermarking in Curvelet Domain. In: Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents (2008), doi:10.1117\/12.765895","DOI":"10.1117\/12.765895"},{"key":"15_CR70","doi-asserted-by":"crossref","unstructured":"Xie, Z., Wang, S., Gan, L., et al.: Content Based Image Watermarking in the Ridgelet Domain. In: 2008 International Symposium on Electronic Commerce and Security (2008), doi:10.1109\/ISECS.2008.32","DOI":"10.1109\/ISECS.2008.32"},{"key":"15_CR71","doi-asserted-by":"crossref","unstructured":"Xia, X., Boncelet, C., Arce, G.: Wavelet transform based watermark for digital images. Optics Express (1998), doi:10.1364\/OE.3.000497","DOI":"10.1364\/OE.3.000497"},{"key":"15_CR72","doi-asserted-by":"crossref","unstructured":"Huang, D., Liu, J., Huang, J., et al.: A DWT-based image watermarking algorithm. In: IEEE International Conference on Multimedia and Expo. (2001), doi:10.1109\/ICME.2001.1237719","DOI":"10.1109\/ICME.2001.1237719"},{"key":"15_CR73","doi-asserted-by":"crossref","unstructured":"Yu, J., Chi, J., Zhuang, X.: A New Wavelet-based Robust Watermarking for Digital Image. In: IEEE International Conference on Networking, Sensing and Control (2008), doi:10.1109\/ICNSC.2008.4525436","DOI":"10.1109\/ICNSC.2008.4525436"},{"key":"15_CR74","doi-asserted-by":"crossref","unstructured":"Rawat, S., Bhatnagar, G., Raman, B.: A Robust Watermarking Scheme using Best Tree Wavelet Packet Transform. In: IEEE International Advance Computing Conference (2009), doi:10.1109\/IADCC.2009.4809132","DOI":"10.1109\/IADCC.2009.4809132"},{"key":"15_CR75","doi-asserted-by":"crossref","unstructured":"Sun, D.: A Method to Estimate Watermark Invisibility before Embedding in DWT Domain. In: International Conference on Networking and Digital Society (2009), doi:10.1109\/ICNDS.2009.135","DOI":"10.1109\/ICNDS.2009.135"},{"key":"15_CR76","doi-asserted-by":"crossref","unstructured":"Taherinia, A., Jamzad, M.: A New Adaptive Watermarking Attack in Wavelet Domain. In: International Multimedia, Signal Processing and Communication Technologies (2009), doi:10.1109\/MSPCT.2009.5164240","DOI":"10.1109\/MSPCT.2009.5164240"},{"key":"15_CR77","doi-asserted-by":"crossref","unstructured":"Langelaar, G., Setyawan, I., Lagendijk, R.L.: Watermarking Digital Image and Video Data. IEEE Signal Processing Magazine (2000), doi:10.1109\/79.879337","DOI":"10.1109\/79.879337"},{"key":"15_CR78","doi-asserted-by":"crossref","unstructured":"Zhu, W., Xiong, Z., Zhang, Y.Q.: Multiresolution watermarking for images and video. IEEE Trans. on Circuits and Systems for Video Technology (1998), doi:10.1109\/ICIP.1998.723530","DOI":"10.1109\/ICIP.1998.723530"},{"key":"15_CR79","doi-asserted-by":"crossref","unstructured":"Santhi, V., Rekha, N., Tharini, S.: A hybrid block based watermarking algorithm using DWT-DCT-SVD techniques for color images. In: International Conference on Computing, Communication and Networking (2008), doi:10.1109\/ICCCNET.2008.4907259","DOI":"10.1109\/ICCCNET.2008.4907259"},{"key":"15_CR80","doi-asserted-by":"crossref","unstructured":"Yang, H., Zhang, T.: A New Algorithm of Compound Image Watermarking Based on DDWT. In: International Conference on MultiMedia and Information Technology (2008), doi:10.1109\/MMIT.2008.88","DOI":"10.1109\/MMIT.2008.88"},{"key":"15_CR81","doi-asserted-by":"crossref","unstructured":"Mabtoul, S., Ibn Elhaj, E., Aboutajdine, D.: A Robust Digital Image Watermarking Method Using Dual Tree Complex Wavelet Transform. In: IEEE Symposium on Computers and Communications (2008), doi:10.1109\/ISCC.2008.4625651","DOI":"10.1109\/ISCC.2008.4625651"},{"key":"15_CR82","unstructured":"Lin, C.H., Jen, J.S., Kuo, L.C.: Distributed Discrete Wavelet Transformation for Copyright Protection. In: 7th International Workshop on Image Analysis for Multimedia (2006)"},{"key":"15_CR83","unstructured":"Kingsbury, N.G.: The dual-tree complex wavelet transform: a new technique for shift invariance and directional filters. In: IEEE Digital Signal Processing Workshop (1998)"},{"key":"15_CR84","doi-asserted-by":"crossref","unstructured":"Wang, X., Jun Wu, J., Niu, P.: A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks. IEEE Trans. on Information Forensics and Security (2007), doi:10.1109\/TIFS.2007.908233","DOI":"10.1109\/TIFS.2007.908233"},{"issue":"4","key":"15_CR85","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TCOM.1983.1095851","volume":"31","author":"P.J. Burt","year":"1983","unstructured":"Burt, P.J., Adelson, E.H.: The Laplacian pyramid as a compact image code. IEEE Trans. Commun.\u00a031(4), 532\u2013540 (1983)","journal-title":"IEEE Trans. Commun."},{"key":"15_CR86","doi-asserted-by":"crossref","unstructured":"Bamberger, R.H., Smith, M.J.T.: A filter bank for the directional decomposition of images: Theory and design. IEEE Trans. Signal Proc.1992), doi:10.1109\/78.127960","DOI":"10.1109\/78.127960"},{"key":"15_CR87","doi-asserted-by":"crossref","unstructured":"Eslami, R., Radha, H.: Wavelet-based Contourlet Transform and its Application to Image coding. In: Proc. IEEE International Conference on Image Processing (2004), doi:10.1109\/ICIP.2004.1421791","DOI":"10.1109\/ICIP.2004.1421791"},{"key":"15_CR88","doi-asserted-by":"crossref","unstructured":"Do, M.N., Vetterli, M.: The contourlet transform: An efficient directional multiresolution image representation. IEEE Trans. Image Processing (2005), doi:10.1109\/TIP.2005.859376","DOI":"10.1109\/TIP.2005.859376"},{"key":"15_CR89","doi-asserted-by":"crossref","unstructured":"Tang, L., Zhao, Z.: Multiresolution image fusion based on the wavelet-based contourlet transform. In: Proc. International Conference on Information Fusion (2007), doi:10.1109\/ICIF.2007.4407989","DOI":"10.1109\/ICIF.2007.4407989"},{"key":"15_CR90","doi-asserted-by":"crossref","unstructured":"Wang, S.H., Lin, Y.P.: Wavelet tree-quantization for copyright protection watermarking. IEEE Trans. on Image Processing (2004), doi:10.1109\/TIP.2004.823822","DOI":"10.1109\/TIP.2004.823822"},{"key":"15_CR91","doi-asserted-by":"crossref","unstructured":"Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (1998), doi:10.1109\/ICASSP.1998.678149","DOI":"10.1109\/ICASSP.1998.678149"},{"key":"15_CR92","doi-asserted-by":"crossref","unstructured":"Tsai, M., Lin, C.: Constrained wavelet tree quantization for image watermarking. In: Proc. IEEE International Conference on Communication (2007), doi:10.1109\/ICC.2007.227","DOI":"10.1109\/ICC.2007.227"}],"container-title":["Studies in Computational Intelligence","Intelligent Multimedia Analysis for Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11756-5_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:43:32Z","timestamp":1606185812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11756-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117541","9783642117565"],"references-count":92,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11756-5_15","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2010]]}}}