{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:07:37Z","timestamp":1741666057789,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642240843"},{"type":"electronic","value":"9783642240850"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24085-0_65","type":"book-chapter","created":{"date-parts":[[2011,9,9]],"date-time":"2011-09-09T22:18:54Z","timestamp":1315606734000},"page":"636-649","source":"Crossref","is-referenced-by-count":2,"title":["Improved Content-Based Watermarking Using Scale-Invariant Feature Points"],"prefix":"10.1007","author":[{"given":"Na","family":"Li","sequence":"first","affiliation":[]},{"given":"Edwin","family":"Hancock","sequence":"additional","affiliation":[]},{"given":"Xiaoshi","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","doi-asserted-by":"crossref","unstructured":"van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing (ICIP 1994), vol.\u00a02, pp. 86\u201390 (1994)","DOI":"10.1109\/ICIP.1994.413536"},{"key":"65_CR2","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L.: A review of watermarking and the importance of perceptual modelling. In: Proc. SPIE Conf. on Human Vision and Electronic Imaging II, vol.\u00a03016, pp. 92\u201399 (1997)","DOI":"10.1117\/12.274502"},{"issue":"6","key":"65_CR3","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TCOM.1985.1096337","volume":"33","author":"N.B. Nill","year":"1985","unstructured":"Nill, N.B.: A Visual Model Weighted Cosine Transform for Image Compression and Quality Assessment. IEEE Transactions on Communications\u00a033(6), 551\u2013557 (1985)","journal-title":"IEEE Transactions on Communications"},{"issue":"10","key":"65_CR4","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/5.241504","volume":"81","author":"N. Jayant","year":"1993","unstructured":"Jayant, N., Johnston, J., Safranek, B.: Signal compression based on models of human perception. Proceedings of the IEEE\u00a081(10), 1385\u20131422 (1993)","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"65_CR5","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0165-1684(98)00124-8","volume":"70","author":"M.P. Eckert","year":"1998","unstructured":"Eckert, M.P., Bradley, A.P.: Perceptual quality metrics applied to still image compression. Signal Processing\u00a070(3), 177\u2013200 (1998)","journal-title":"Signal Processing"},{"key":"65_CR6","doi-asserted-by":"crossref","unstructured":"Kankanhalli, M.S., Rajmohan, Ramakrishnan, K.R.: Content based watermarking of images. In: International Multimedia Conference in: Proceedings of the Sixth ACM International Conference on Multimedia, Bristol, United Kingdom, pp. 61\u201370 (1998)","DOI":"10.1145\/290747.290756"},{"issue":"3","key":"65_CR7","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1117\/1.482616","volume":"7","author":"J.F. Delaigle","year":"1998","unstructured":"Delaigle, J.F., De Vleeschouwer, C., Macq, B.: Psychovisual approach to digital picture watermarking. Journal of Electronic Imaging\u00a07(3), 628\u2013640 (1998)","journal-title":"Journal of Electronic Imaging"},{"issue":"3","key":"65_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/S0165-1684(98)00013-9","volume":"66","author":"J.F. Delaigle","year":"1998","unstructured":"Delaigle, J.F., De Vleeschouwer, C., Macq, B.: Watermarking algorithm based on a human visual model. Signal Processing\u00a066(3), 319\u2013335 (1998)","journal-title":"Signal Processing"},{"issue":"6","key":"65_CR9","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1016\/j.sigpro.2006.11.009","volume":"87","author":"F. Autrusseau","year":"2007","unstructured":"Autrusseau, F., Le Callet, P.: A robust image watermarking technique based on quantization noise visibility thresholds. Signal Processing\u00a087(6), 1363\u20131383 (2007)","journal-title":"Signal Processing"},{"key":"65_CR10","unstructured":"Andrew, B.: Watson. DCT quantization matrices visually optimized for individual images. In: Proceedings of SPIE: Human vision, Visual Processing and Digital Display IV, vol.\u00a01913, pp. 202\u2013216"},{"key":"65_CR11","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/83.136601","volume":"1","author":"A.S. Lewis","year":"1992","unstructured":"Lewis, A.S., Knowles, G.: Image compression using the 2-D wavelet transform. IEEE Trans. Image Processing\u00a01, 244\u2013250 (1992)","journal-title":"IEEE Trans. Image Processing"},{"issue":"5","key":"65_CR12","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M. Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Transaction on Image Processing\u00a010(5), 783\u2013791 (2001)","journal-title":"IEEE Transaction on Image Processing"},{"issue":"4","key":"65_CR13","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"C.I. Podilchuk","year":"1998","unstructured":"Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications\u00a016(4), 525\u2013539 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"8","key":"65_CR14","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/83.605413","volume":"6","author":"A.B. Watson","year":"1997","unstructured":"Watson, A.B., Yang, G.Y., Solomon, J.A., Villasenor, J.D.: Visibility of wavelet quantization noise. IEEE Transactions on Image Processing\u00a06(8), 1164\u20131175 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"65_CR15","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.sigpro.2007.07.020","volume":"88","author":"H. Qi","year":"2008","unstructured":"Qi, H., Zheng, D., Zhao, J.: Human visual system based adaptive digital image watermarking. Signal Processing\u00a088(1), 174\u2013188 (2008)","journal-title":"Signal Processing"},{"key":"65_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/10719724_16","volume-title":"Information Hiding","author":"S. Voloshynovskiy","year":"2000","unstructured":"Voloshynovskiy, S., Herrigel, A., Baumgaertner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 212\u2013236. Springer, Heidelberg (2000)"},{"key":"65_CR17","doi-asserted-by":"crossref","unstructured":"David, G.: Lowe. Object Recognition from Local Scale-Invariant Features. In: International Conference on Computer Vision, Corfu, Greece, pp. 1150\u20131157 (September 1999)","DOI":"10.1109\/ICCV.1999.790410"},{"issue":"2","key":"65_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D.G. Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision\u00a060(2), 91\u2013110 (2004)","journal-title":"International Journal of Computer Vision"},{"key":"65_CR19","doi-asserted-by":"crossref","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security (in press, 2011)","DOI":"10.1109\/TIFS.2011.2129512"},{"issue":"4","key":"65_CR20","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X. Pan","year":"2010","unstructured":"Pan, X., Lyu, S.: Region Duplication Detection Using Image Feature Matching. IEEE Transactions on Information Forensics and Security\u00a05(4), 857\u2013867 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"65_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-642-10467-1_50","volume-title":"Advances in Multimedia Information Processing - PCM 2009","author":"P.-B. Nguyen","year":"2009","unstructured":"Nguyen, P.-B., Beghdadi, A., Luong, M.: Robust Watermarking in DoG Scale Space Using a Multi-scale JND Model. In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds.) PCM 2009. LNCS, vol.\u00a05879, pp. 561\u2013573. Springer, Heidelberg (2009)"},{"key":"65_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/11582267_28","volume-title":"Advances in Multimedia Information Processing - PCM 2005","author":"H.-Y. Lee","year":"2005","unstructured":"Lee, H.-Y., Lee, C.-h., Lee, H.-K., Nam, J.: Feature-Based Image Watermarking Method Using Scale-Invariant Keypoints. In: Ho, Y.-S., Kim, H.-J. (eds.) PCM 2005. LNCS, vol.\u00a03768, pp. 312\u2013324. Springer, Heidelberg (2005)"},{"key":"65_CR23","unstructured":"http:\/\/www.cs.ubc.ca\/~lowe\/keypoints\/"},{"key":"65_CR24","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In: Proceedings of 2nd International Conference on Knowledge Discovery and Data Mining (KDD 1996), pp. 226\u2013231 (1996)"}],"container-title":["Lecture Notes in Computer Science","Image Analysis and Processing \u2013 ICIAP 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24085-0_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T09:13:23Z","timestamp":1741598003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24085-0_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642240843","9783642240850"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24085-0_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}