{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:04:12Z","timestamp":1743116652553,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164347"},{"type":"electronic","value":"9783642164354"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16435-4_19","type":"book-chapter","created":{"date-parts":[[2010,9,30]],"date-time":"2010-09-30T22:29:53Z","timestamp":1285885793000},"page":"249-261","source":"Crossref","is-referenced-by-count":2,"title":["Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework"],"prefix":"10.1007","author":[{"given":"Jian","family":"Cao","sequence":"first","affiliation":[]},{"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1016\/S0165-1684(03)00168-3","volume":"83","author":"M. Barni","year":"2003","unstructured":"Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing\u00a083, 2069\u20132084 (2003)","journal-title":"Signal Processing"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"19_CR3","first-page":"5","volume":"IX","author":"A. Kerckhoffs","year":"1883","unstructured":"Kerckhoffs, A.: La cryptographie militaire. Journal Des Sciences Militaires\u00a0IX, 5\u201338 (1883)","journal-title":"Journal Des Sciences Militaires"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Kalker, T.: Considerations on watermarking security. In: Proc. MMSP, Cannes, France, pp. 201\u2013206 (October 2001)","DOI":"10.1109\/MMSP.2001.962734"},{"issue":"10","key":"19_CR5","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F. Cayre","year":"2005","unstructured":"Cayre, F., Furon, T., Fontaine, C.: Watermarking security: Theory and practice. IEEE Trans. Signal Process.\u00a053(10), 3976\u20133987 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"12","key":"19_CR6","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"Cox, I., Killian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Processing"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"53","author":"H.S. Malvar","year":"2003","unstructured":"Malvar, H.S., Fl\u00f4rencio, D.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process.\u00a053, 898\u2013905 (2003)","journal-title":"IEEE Trans. Signal Process."},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/11558859_12","volume-title":"Information Hiding","author":"P. Comesa\u00f1a","year":"2005","unstructured":"Comesa\u00f1a, P., P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 146\u2013160. Springer, Heidelberg (2005)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Bas, P., Cayre, F.: Achieving subspace or key security for woa using natural or circular watermarking. In: Proc. ACM Multimedia Security Workshop, Geneva (2006)","DOI":"10.1145\/1161366.1161381"},{"issue":"1","key":"19_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2007.916006","volume":"3","author":"F. Cayre","year":"2008","unstructured":"Cayre, F., Bas, P.: Kerckhoffs-based embedding security classes for WOA Data Hiding. IEEE Trans. Inf. Forensics and Security\u00a03(1), 1\u201315 (2008)","journal-title":"IEEE Trans. Inf. Forensics and Security"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-74124-4_1","volume-title":"Information Hiding","author":"P. Bas","year":"2007","unstructured":"Bas, P., Cayre, F.: Natural watermarking: a secure spread spectrum technique for WOA. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 1\u201314. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16435-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T06:02:40Z","timestamp":1553148160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16435-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164347","9783642164354"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16435-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}