{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T16:52:46Z","timestamp":1761929566148},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642253669"},{"type":"electronic","value":"9783642253676"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25367-6_23","type":"book-chapter","created":{"date-parts":[[2011,11,19]],"date-time":"2011-11-19T11:15:32Z","timestamp":1321701332000},"page":"257-266","source":"Crossref","is-referenced-by-count":3,"title":["On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR"],"prefix":"10.1007","author":[{"given":"Huo-Chong","family":"Ling","sequence":"first","affiliation":[]},{"given":"Raphael C. -W.","family":"Phan","sequence":"additional","affiliation":[]},{"given":"Swee-Huay","family":"Heng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"23_CR1","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TCOM.1976.1093309","volume":"24","author":"H.C. Andrews","year":"1976","unstructured":"Andrews, H.C., Patterson, C.L.: Singular Value Decomposition(SVD) Image Coding. IEEE Trans. Commun.\u00a024(4), 425\u2013432 (1976)","journal-title":"IEEE Trans. Commun."},{"issue":"5","key":"23_CR2","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.aeue.2007.02.010","volume":"62","author":"V. Aslantas","year":"2008","unstructured":"Aslantas, V.: A Singular-Value Decomposition-Based Image Watermarking using Genetic Algorithm. AEU - Int. J. Electron. Commun.\u00a062(5), 386\u2013394 (2008)","journal-title":"AEU - Int. J. Electron. Commun."},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","volume":"26","author":"C.C. Chang","year":"2005","unstructured":"Chang, C.C., Tsai, P., Lin, C.C.: SVD-Based Image Watermarking Scheme. Pattern Recognit. Lett.\u00a026, 1577\u20131586 (2005)","journal-title":"Pattern Recognit. Lett."},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-540-74450-4_8","volume-title":"Combinatorics, Algorithms, Probabilistic and Experimental Methodologies","author":"C.C. Chang","year":"2007","unstructured":"Chang, C.C., Hu, Y.S., Lin, C.C.: A Digital Watermarking Scheme Based on Singular Value Decomposition. In: Chen, B., Paterson, M., Zhang, G. (eds.) ESCAPE 2007. LNCS, vol.\u00a04614, pp. 82\u201393. Springer, Heidelberg (2007)"},{"issue":"2","key":"23_CR5","first-page":"609","volume":"3","author":"C.C. Chang","year":"2007","unstructured":"Chang, C.C., Lin, C.C., Hu, Y.S.: An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images. Int. J. Innov. Comput. Inf. Control.\u00a03(2), 609\u2013620 (2007)","journal-title":"Int. J. Innov. Comput. Inf. Control."},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1145\/1022431.1022461","volume-title":"2004 Workshop on Multimedia and Security","author":"E. Ganic","year":"2004","unstructured":"Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies. In: 2004 Workshop on Multimedia and Security, pp. 166\u2013174. ACM, Magdeburg (2004)"},{"issue":"4","key":"23_CR7","doi-asserted-by":"publisher","first-page":"43004","DOI":"10.1117\/1.2137650","volume":"14","author":"E. Ganic","year":"2005","unstructured":"Ganic, E., Eskicioglu, A.M.: Robust Embedding of Visual Watermarks using Discrete Wavelet Transform and Singular Value Decomposition. J. Electron. Imaging.\u00a014(4), 43004 (2005)","journal-title":"J. Electron. Imaging."},{"issue":"5","key":"23_CR8","first-page":"1","volume":"2","author":"R. Ghazy","year":"2007","unstructured":"Ghazy, R., El-Fishawy, N., Hadhoud, M., Dessouky, M., El-Samie, F.: An Efficient Block-by-Block SVD-Based Image Watermarking Scheme. Ubiquitous Comput. Commun. J.\u00a02(5), 1\u20139 (2007)","journal-title":"Ubiquitous Comput. Commun. J."},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1016\/j.patrec.2004.07.003","volume":"25","author":"F. Huang","year":"2004","unstructured":"Huang, F., Guan, Z.H.: A Hybrid SVD-DCT Watermarking Method Based on LPSNR. Pattern Recognit. Lett.\u00a025, 1769\u20131775 (2004)","journal-title":"Pattern Recognit. Lett."},{"issue":"4","key":"23_CR10","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.dsp.2011.01.017","volume":"21","author":"C.C. Lai","year":"2011","unstructured":"Lai, C.C.: A Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm. Digital Signal Processing\u00a021(4), 522\u2013527 (2011)","journal-title":"Digital Signal Processing"},{"issue":"1","key":"23_CR11","first-page":"22","volume":"2","author":"S. Lagzian","year":"2011","unstructured":"Lagzian, S., Soryani, M., Fathy, M.: A New Robust Watermarking Scheme Based on RDWT-SVD. Int. J. Intell. Inf. Process.\u00a02(1), 22\u201329 (2011)","journal-title":"Int. J. Intell. Inf. Process."},{"issue":"1","key":"23_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R. Liu","year":"2002","unstructured":"Liu, R., Tan, T.: An SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Trans. Multimedia.\u00a04(1), 121\u2013128 (2002)","journal-title":"IEEE Trans. Multimedia."},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","volume":"88","author":"A.A. Mohammad","year":"2008","unstructured":"Mohammad, A.A., Alhaj, A., Shaltaf, S.: An Improved SVD-Based Watermarking Scheme for Protecting Rightful Ownership. Signal Processing\u00a088, 2158\u20132180 (2008)","journal-title":"Signal Processing"},{"issue":"2","key":"23_CR14","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TMM.2005.843357","volume":"7","author":"X.P. Zhang","year":"2005","unstructured":"Zhang, X.P., Li, K.: Comments on \u201cAn SVD-Based Watermarking Scheme for Protecting Rightful Ownership\u201d. IEEE Trans. Multimedia.\u00a07(2), 593\u2013594 (2005)","journal-title":"IEEE Trans. Multimedia."},{"issue":"2","key":"23_CR15","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TMM.2006.886297","volume":"9","author":"R. Rykaczewski","year":"2007","unstructured":"Rykaczewski, R.: Comments on \u201cAn SVD-Based Watermarking Scheme for Protecting Rightful Ownership\u201d. IEEE Trans. Multimedia.\u00a09(2), 421\u2013423 (2007)","journal-title":"IEEE Trans. Multimedia."},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-13577-4_12","volume-title":"Advances in Computer Science and Information Technology","author":"H.C. Ling","year":"2010","unstructured":"Ling, H.C., Phan, R.C.W., Heng, S.H.: Analysis on the Improved SVD-Based Watermarking Scheme. In: Kim, T.H., Adeli, H. (eds.) AST\/UCMA\/ISA\/ACN 2010. LNCS, vol.\u00a06059, pp. 143\u2013149. Springer, Heidelberg (2010)"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-540-69304-8_10","volume-title":"Intelligence and Security Informatics","author":"H.C. Ling","year":"2008","unstructured":"Ling, H.C., Phan, R.C.W., Heng, S.H.: Attacks on SVD-Based Watermarking Schemes. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol.\u00a05075, pp. 83\u201391. Springer, Heidelberg (2008)"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Ling, H.C., Heng, S.H., Goi, B.M.: Attacks on a Block Based SVD Watermarking Scheme. In: 6th Int. Conf. Inf. Technol.: New Generations (ITNG 2009), Las Vegas, Nevada, vol.\u00a01-3, pp. 371\u2013375 (2009)","DOI":"10.1109\/ITNG.2009.37"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/11734727_30","volume-title":"Information Security and Cryptology - ICISC 2005","author":"G.C.W. Ting","year":"2006","unstructured":"Ting, G.C.W.: Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. In: Won, D., Kim, S. (eds.) ICISC 2005. LNCS, vol.\u00a03935, pp. 378\u2013388. Springer, Heidelberg (2006)"},{"issue":"4","key":"23_CR20","doi-asserted-by":"publisher","first-page":"40501","DOI":"10.1117\/1.3041170","volume":"17","author":"L. Xiao","year":"2005","unstructured":"Xiao, L., Wei, Z., Ye, J.: Comments on \u201cRobust Embedding of Visual Watermarks using Discrete Wavelet Transform and Singular Value Decomposition\u201d and Theorectical Analysis. J. Electron. Imaging.\u00a017(4), 40501 (2005)","journal-title":"J. Electron. Imaging."},{"issue":"1","key":"23_CR21","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.aeue.2008.09.007","volume":"64","author":"Y. Xing","year":"2010","unstructured":"Xing, Y., Tan, J.: Mistakes in the Paper Entitled \u201cA Singular-Value Decomposition-Based Image Watermarking using Genetic Algorithm\u201d. AEU - Int. J. Electron. Commun.\u00a064(1), 80\u201381 (2010)","journal-title":"AEU - Int. J. Electron. Commun."},{"key":"23_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4740-9","volume-title":"Chaos and Fractals: New Frontiers of Science","author":"H.O. Peitgen","year":"1992","unstructured":"Peitgen, H.O., Jurgens, H., Saupe, D.: Chaos and Fractals: New Frontiers of Science. Springer, New York (1992)"},{"issue":"2","key":"23_CR23","first-page":"235","volume":"7","author":"F. Huang","year":"2008","unstructured":"Huang, F.: A New General Transparency Model for Block-Based Watermarking Method. Int. J. of Network Secur.\u00a07(2), 235\u2013239 (2008)","journal-title":"Int. J. of Network Secur."}],"container-title":["Lecture Notes in Computer Science","Advances in Image and Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25367-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T22:47:51Z","timestamp":1555627671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25367-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642253669","9783642253676"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25367-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}