{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T04:26:40Z","timestamp":1741926400501,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642245558"},{"type":"electronic","value":"9783642245565"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24556-5_2","type":"book-chapter","created":{"date-parts":[[2011,11,3]],"date-time":"2011-11-03T04:23:52Z","timestamp":1320294232000},"page":"18-36","source":"Crossref","is-referenced-by-count":1,"title":["Embedding Binary Watermarks in Dual-Tree Complex Wavelets Domain for Access Control of Digital Images"],"prefix":"10.1007","author":[{"given":"Huijuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xudong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Alex C.","family":"Kot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kundur","year":"1999","unstructured":"Kundur, D., Hatzinakos, D.: Digital Watermarking for Telltale Tamper Proofing and Authentication. Proc. IEEE\u00a087(7), 1167\u20131180 (1999)","journal-title":"Proc. IEEE"},{"issue":"5","key":"2_CR2","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1109\/41.954550","volume":"48","author":"M.-S. Hsieh","year":"2001","unstructured":"Hsieh, M.-S., Tseng, D.-C., Huang, Y.-H.: Hiding Digital Watermarks Using Multiresolution Wavelet Transform. IEEE Trans. on Industrial Electronics\u00a048(5), 875\u2013882 (2001)","journal-title":"IEEE Trans. on Industrial Electronics"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Chan, P.W., Lyu, M.R., Chin, R.T.: A Novel Scheme for Hybrid Digital Video Watermarking: Approach, Evaluation and Experimentation. IEEE Trans. Circuits Syst. Video Technol.\u00a015(12), 1638\u20131649","DOI":"10.1109\/TCSVT.2005.856932"},{"issue":"10","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"P.W. Wong","year":"2001","unstructured":"Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process.\u00a010(10), 1593\u20131601 (2001)","journal-title":"IEEE Trans. Image Process."},{"key":"2_CR5","first-page":"263","volume":"18","author":"G. Doerr","year":"2003","unstructured":"Doerr, G., Dugelay, J.-L.: A Guide tour of video watermarking. Signal Processing: Image Communicatin\u00a018, 263\u2013282 (2003)","journal-title":"Signal Processing: Image Communicatin"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Kingsbury, N.: A Dual-Tree Complex Transform With Improved Orthogonality and Symmetry Properties. In: Proc. of Int. Conf. Imag. Proc., vol.\u00a02, pp. 375\u2013378 (September 2000)","DOI":"10.1109\/ICIP.2000.899397"},{"issue":"3","key":"2_CR7","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1006\/acha.2000.0343","volume":"10","author":"N. Kingbury","year":"2001","unstructured":"Kingbury, N.: Complex Wavelets For Shift Invariant Analysis and Filtering of Signals. Journal of Applied And Computational Harmonic Analysis\u00a010(3), 234\u2013253 (2001)","journal-title":"Journal of Applied And Computational Harmonic Analysis"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Selesnick, I.W., Baraniuk, R.G., Kingsbury, N.G.: The Dual-Tree Complex Wavelet Transform. IEEE Signal Process. Magazine, 123\u2013151 (2005)","DOI":"10.1109\/MSP.2005.1550194"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Loo, P., Kingbury, N.: Digital Watermarking Using Complex Wavlets. In: IEEE Int. Conf. on Image Processing, vol.\u00a03, pp. 29\u201332 (September 2000)","DOI":"10.1109\/ICIP.2000.899275"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Terzija, N., Geisselhardt, W.: Digital Image Watermarking Using Complex Wavelet Transform. In: Proc. Workshop Multimedia Security, pp. 193\u2013198 (2004)","DOI":"10.1145\/1022431.1022465"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Thomson, A.I., Bouridane, A., Kurugollu, F.: Spread Transform Watermarking for Digital Multimedia Using the Complex Wavelet Transform. In: ECSIS Symp. on Bio-inspired, Learning, and Intelligent Systems for Security, pp. 123\u2013132 (2007)","DOI":"10.1109\/BLISS.2007.39"},{"issue":"3","key":"2_CR12","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/TIFS.2008.927421","volume":"3","author":"E.C. Lino","year":"2008","unstructured":"Lino, E.C., Pickering, M.R., Nasiopoulos, P., Rabab, K.W.: A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform. IEEE Trans. on Information Forensics and Security\u00a03(3), 466\u2013474 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"issue":"7","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1117\/1.1384885","volume":"40","author":"G.-J. Yu","year":"2001","unstructured":"Yu, G.-J., Lu, C.-S., Mark Liao, H.-Y.: Mean-quantization-based fragile warermarking for image authentication. Optical Eng.\u00a040(7), 1396\u20131408 (2001)","journal-title":"Optical Eng."},{"key":"2_CR14","first-page":"266","volume":"2","author":"L. Coria","year":"2007","unstructured":"Coria, L., Nasiopoulos, P., Ward, R., Pickering, M.: An Access Control Video Watermarking Method that is Robust to Geometric Distortions. Journal of Information Assurance and Security\u00a02, 266\u2013274 (2007)","journal-title":"Journal of Information Assurance and Security"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Yang, H., Jiang, X., Kot, A.C.: Image watermarking using dual-tree complex wavelet by coefficients swapping and group of coefficients quantization. In: Prof. of the IEEE Int. Conf. on Multimedia and Expo. (ICME 2010), Singapore, July 19-23, pp. 1673\u20131678 (2010)","DOI":"10.1109\/ICME.2010.5582958"},{"key":"2_CR16","unstructured":"The USC-SIPI Image Database, http:\/\/www.petitcolas.net\/fabien\/watermarking\/image_database\/index.html"},{"key":"2_CR17","unstructured":"Photo Database, http:\/\/sipi.usc.edu\/database\/"}],"container-title":["Lecture Notes in Computer Science","Transactions on Data Hiding and Multimedia Security VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24556-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T18:56:54Z","timestamp":1741892214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24556-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642245558","9783642245565"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24556-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}