{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:13:12Z","timestamp":1758874392028},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642162947"},{"type":"electronic","value":"9783642162954"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16295-4_6","type":"book-chapter","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T08:49:45Z","timestamp":1286268585000},"page":"59-66","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Self-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking"],"prefix":"10.1007","author":[{"given":"Pratheepan","family":"Yogarajah","sequence":"first","affiliation":[]},{"given":"Joan","family":"Condell","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Curran","sequence":"additional","affiliation":[]},{"given":"Abbas","family":"Cheddad","sequence":"additional","affiliation":[]},{"given":"Paul","family":"McKevit","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/38.736465","volume":"19","author":"G. Voyatzis","year":"1999","unstructured":"Voyatzis, G., Pitas, I.: Protecting digital-image copyrights: a framework. IEEE Computer Graphics and Applications\u00a019, 18\u201324 (1999)","journal-title":"IEEE Computer Graphics and Applications"},{"issue":"3&4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035(3&4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"issue":"12","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Killian, J., Leighton, T., Shammon, T.: Secure spread spectrum for multimedia. IEEE Transactions on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"key":"6_CR4","volume-title":"Wavelet and Subband Coding","author":"M. Vetterli","year":"1995","unstructured":"Vetterli, M., Kovacevic, J.: Wavelet and Subband Coding. Prentice-Hall, Englewood Cliffs (1995)"},{"issue":"7","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/5.771067","volume":"87","author":"R.B. Wolfgang","year":"1999","unstructured":"Wolfgang, R.B., Podichuk, C.I., Delp, E.J.: Perceptual watermarks for digital images and video. Proceedings of the IEEE\u00a087(7), 1108\u20131126 (1999)","journal-title":"Proceedings of the IEEE"},{"issue":"12","key":"6_CR6","doi-asserted-by":"publisher","first-page":"2324","DOI":"10.1016\/j.sigpro.2009.02.001","volume":"89","author":"A. Cheddad","year":"2009","unstructured":"Cheddad, A., Condell, J., Curran, K., McKevitt, P.: A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing\u00a089(12), 2324\u20132332 (2009)","journal-title":"Signal Processing"},{"key":"6_CR7","unstructured":"Daren, H., Jiufen, L., Jiwu, H., Hongmei, L.: A DWT-based image watermarking algorithm. In: IEEE Int. Conf. Multimedia and Expo., pp. 429\u2013432 (2001)"},{"issue":"5","key":"6_CR8","doi-asserted-by":"publisher","first-page":"401","DOI":"10.4218\/etrij.02.0202.0502","volume":"24","author":"S. Joo","year":"2002","unstructured":"Joo, S., Suh, Y., Shin, J., Kitkuchi, H.: A New Robust Watermark Embedding into Wavelet DC Components. ETRI Journal\u00a024(5), 401\u2013404 (2002)","journal-title":"ETRI Journal"},{"key":"6_CR9","unstructured":"Floyd, R.W., Steinberg, L.: An adaptive algorithm for spatial grayscale. In: Proc. Soc. Inf. Disp., vol.\u00a012, pp. 55\u201377 (1976)"},{"key":"6_CR10","unstructured":"Neelamani, R., Nowak, R., Baraniuk, R.G.: WInHD: wavelet-based inverse halftoning via deconvolution. submitted to IEEE Trans. Image Process. for publication (2002)"},{"key":"6_CR11","volume-title":"Digital Image Processing and Analysis","author":"B. Chanda","year":"2000","unstructured":"Chanda, B., Dutta Majumder, D.: Digital Image Processing and Analysis. Prentice-Hall, Englewood Cliffs (2000)"},{"key":"6_CR12","unstructured":"Richards, D., Abrahamsen, A.: Image compression using singular value decomposition. linear algebra applications (2001)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Prasantha, H.S., Shashidhara, H.L., Balasubramanya Murthy, K.N.: Image Compression using SVD. In: Proc. of International Conference on Computational Intelligence and Multimedia Applications, pp. 143\u2013145 (2007)","DOI":"10.1109\/ICCIMA.2007.386"},{"issue":"6","key":"6_CR14","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1016\/j.optcom.2009.10.106","volume":"283","author":"A. Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., McKevitt, P.: A Hash-based Image Encryption Algorithm. Opt. Comm. Elsevier Science.\u00a0283(6), 879\u2013893 (2010)","journal-title":"Opt. Comm. Elsevier Science."},{"issue":"5","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1016\/j.ins.2007.10.008","volume":"178","author":"Y. Wang","year":"2008","unstructured":"Wang, Y., Liao, X., Xiao, D., Wong, K.: One-way hash function construction based on 2D coupled map lattices. Inf. Sci.\u00a0178(5), 1391\u20131406 (2008)","journal-title":"Inf. Sci."},{"key":"6_CR16","unstructured":"US Secure Hash Algorithm 1 (2001), \n                    \n                      http:\/\/www.faqs.org\/rfcs\/rfc3174"}],"container-title":["Advances in Intelligent and Soft Computing","Image Processing and Communications Challenges 2"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16295-4_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:25:56Z","timestamp":1619785556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16295-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642162947","9783642162954"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16295-4_6","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2010]]}}}