{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:30:24Z","timestamp":1725593424539},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223884"},{"type":"electronic","value":"9783642223891"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22389-1_2","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T20:01:55Z","timestamp":1309204915000},"page":"9-23","source":"Crossref","is-referenced-by-count":0,"title":["Symmetric Cryptography Protocol for Signing and Authenticating Digital Documents"],"prefix":"10.1007","author":[{"given":"Juan C.","family":"Lopez Pimentel","sequence":"first","affiliation":[]},{"given":"Ra\u00fal","family":"Monroy","sequence":"additional","affiliation":[]},{"given":"V\u00edctor Fernando","family":"Ramos Fon Bon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Carts, D.A.: A review of the diffie-hellman algorithm an its use in secure internet protocols. In: As part of the Information Security Reading Room, pp. 1\u20139. SANS Institute (2001)"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/4236.935180","volume":"5","author":"D. Artz","year":"2001","unstructured":"Artz, D.: Digital steganography: Hiding data within data. IEEE Internet Computing\u00a05, 75\u201380 (2001)","journal-title":"IEEE Internet Computing"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proceedings of the Royal Society of London\u00a0426(1), 233\u2013271 (1989)","journal-title":"Proceedings of the Royal Society of London"},{"key":"2_CR4","volume-title":"Digital Watermarking and Steganography","author":"I.J. Cox","year":"2007","unstructured":"Cox, I.J., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, San Francisco (2007)"},{"issue":"6","key":"2_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR6","unstructured":"197 FIPS. Advanced encryption standard (aes). Technical report (2001)"},{"key":"2_CR7","unstructured":"1977 FIPS\u00a01977 FIPS. Data encryption standard. Technical Report Part 6 of Title 15 Code of Federal Regulations (1988)"},{"issue":"3-1","key":"2_CR8","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/TIFS.2007.903849","volume":"2","author":"F. Frattolillo","year":"2007","unstructured":"Frattolillo, F.: Watermarking protocol for web context. IEEE Transactions on Information Forensics and Security\u00a02(3-1), 350\u2013363 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2_CR9","unstructured":"Frattolillo, F., D\u2019Onofrio, S.: A web oriented watermarking protocol. In: IEC, Prague, pp. 91\u201396 (2005)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A. Haouzia","year":"2008","unstructured":"Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimedia Tools and Applications\u00a039, 1\u201346 (2008) 10.1007\/s11042-007-0154-3","journal-title":"Multimedia Tools and Applications"},{"key":"2_CR11","unstructured":"Kessler, G.C., Ciphers, N.: An overview of steganography for the computer forensics examiner. Federal Bureau of Investigations, viewed 28 (2004)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Kostopoulos, I., Gilani, S.A.M., Skodras, A.N.: Colour image authentication based on a self-embedding technique. In: 14th International Conference on Digital Signal Processing DSP 2002, vol.\u00a02(1), pp. 733\u2013736 (2002)","DOI":"10.1109\/ICDSP.2002.1028195"},{"key":"2_CR13","first-page":"879","volume-title":"Proceedings of the IEEE","author":"D. Kundur","year":"2004","unstructured":"Kundur, D., Lin, C.Y., Macq, B., Yu, H.: Special issue on enabling security technologies for digital rights management. In: Proceedings of the IEEE, pp. 879\u2013882. IEEE, Los Alamitos (2004)"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"13","author":"C.-L. Lei","year":"2004","unstructured":"Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing,\u00a013, 1618\u20131626 (2004)","journal-title":"IEEE Transactions on Image Processing,"},{"key":"2_CR15","first-page":"31","volume-title":"Proceedings of the Pan-Sydney Area Workshop on Visual Information Processing VIP 2001","author":"Y. Lim","year":"2001","unstructured":"Lim, Y., Xu, C., Feng, D.D.: Web based image authentication using invisible fragile watermark. In: Proceedings of the Pan-Sydney Area Workshop on Visual Information Processing VIP 2001, vol.\u00a011, pp. 31\u201334. Australian Computer Society, Inc., Darlinghurst (2001)"},{"key":"2_CR16","first-page":"89","volume":"12","author":"J.C. L\u00f3pez-Pimentel","year":"2008","unstructured":"L\u00f3pez-Pimentel, J.C., Monroy, R.: Formal support to security protocol development: a survey. Journal Computacin y Sistemas, special volume celebrating 50 years of Computing in Mexico\u00a012, 89\u2013108 (2008)","journal-title":"Journal Computacin y Sistemas, special volume celebrating 50 years of Computing in Mexico"},{"issue":"3","key":"2_CR17","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"key":"2_CR18","first-page":"162","volume-title":"Proceedings of the 9th IEEE Computer Security Foundations Workshop, CSFW 1996","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Some new attacks upon security protocols. In: Proceedings of the 9th IEEE Computer Security Foundations Workshop, CSFW 1996, pp. 162\u2013169. IEEE Computer Society Press, Washington, DC, USA (1996)"},{"key":"2_CR19","first-page":"31","volume-title":"Proceedings of the 10th IEEE Computer Security Foundations Workshop, CSFW 1997","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop, CSFW 1997, pp. 31\u201344. IEEE Computer Society, Los Alamitos (1997)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Potdar, V.M., Han, E.C.S.: Survey of digital image watermarking techniques. In: 3rd International Conference on Industrial Informatics (INDIN 2005), pp. 709\u2013716 (2005)","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Processing\u00a010, 643\u2013649 (2001)","journal-title":"IEEE Trans. Image Processing"},{"issue":"1-2","key":"2_CR22","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal in Computer Security\u00a06(1-2), 85\u2013128 (1998)","journal-title":"Journal in Computer Security"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics INDIN 2005, vol.\u00a01(1), pp. 709\u2013716 (2005)","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1999","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer\u2019s rights. J. Vis. Commun. Image Representation\u00a09, 194\u2013210 (1999)","journal-title":"J. Vis. Commun. Image Representation"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM\u00a021, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: International Conference on Image Processing, vol.\u00a02, p. 680 (1997)","DOI":"10.1109\/ICIP.1997.638587"}],"container-title":["Communications in Computer and Information Science","Digital Information Processing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22389-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T11:30:25Z","timestamp":1553859025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22389-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223884","9783642223891"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22389-1_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}