{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T16:09:56Z","timestamp":1744906196551},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642313615"},{"type":"electronic","value":"9783642313622"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31362-2_33","type":"book-chapter","created":{"date-parts":[[2012,7,20]],"date-time":"2012-07-20T22:40:55Z","timestamp":1342824055000},"page":"290-296","source":"Crossref","is-referenced-by-count":1,"title":["Robust Color Image Watermarking Using LS-SVM Correction"],"prefix":"10.1007","author":[{"given":"Panpan","family":"Niu","sequence":"first","affiliation":[]},{"given":"Xiangyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mingyu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"33_CR1","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A. Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K.: Digital image steganography: survey and analysis of current methods. Signal Processing\u00a090(3), 727\u2013752 (2010)","journal-title":"Signal Processing"},{"issue":"1","key":"33_CR2","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TIFS.2011.2129511","volume":"6","author":"S. Sadasivam","year":"2011","unstructured":"Sadasivam, S., Moulin, P., Coleman, T.P.: A message-passing approach to combating desynchronization attacks. IEEE Trans. on Information Forensics and Security\u00a06(1), 894\u2013905 (2011)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"issue":"3","key":"33_CR3","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.csi.2007.08.013","volume":"30","author":"Y.G. Fu","year":"2008","unstructured":"Fu, Y.G., Shen, R.M.: Color image watermarking scheme based on linear discriminant analysis. Computer Standard & Interfaces\u00a030(3), 115\u2013120 (2008)","journal-title":"Computer Standard & Interfaces"},{"issue":"3","key":"33_CR4","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1016\/j.eswa.2010.07.147","volume":"38","author":"P.P. Niu","year":"2011","unstructured":"Niu, P.P., Wang, X.Y., Yang, Y.P., Lu, M.Y.: A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Systems with Applications\u00a038(3), 2081\u20132098 (2011)","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"33_CR5","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","volume":"3","author":"T.T. Kin","year":"2008","unstructured":"Kin, T.T., Zhang, X.P.: Color image watermarking using multidimensional Fourier transforms. IEEE Trans. on Information Forensics and Security\u00a03(1), 16\u201328 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"issue":"1","key":"33_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/TIP.2006.884955","volume":"16","author":"A.E. Todd","year":"2007","unstructured":"Todd, A.E., Stephen, J.S.: Hypercomplex Fourier transforms of color images. IEEE Trans. on Image Processing\u00a016(1), 22\u201335 (2007)","journal-title":"IEEE Trans. on Image Processing"},{"key":"33_CR7","unstructured":"Jia, T.: An approach for compressing of multichannel vibration signals of induction machines based on quaternion cosine transform. In: 2010 International Conference on E-Product E-Service and E-Entertainment (ICEEE 2010), Henan, China, November 7-9, pp. 3976\u20133979 (2010)"},{"issue":"9","key":"33_CR8","first-page":"1193","volume":"20","author":"Q. Gai","year":"2009","unstructured":"Gai, Q., Sun, Y.F., Wang, X.L.: Color image digital watermarking using\u00a0discrete quaternion\u00a0cosine-transform. Journal of Optoelectronics Laser\u00a020(9), 1193\u20131197 (2009)","journal-title":"Journal of Optoelectronics Laser"},{"issue":"8","key":"33_CR9","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1109\/TIP.2011.2118216","volume":"20","author":"H. Zhang","year":"2011","unstructured":"Zhang, H., Shu, H., Gouenou, C.: Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans. on Image Processing\u00a020(8), 2189\u20132199 (2011)","journal-title":"IEEE Trans. on Image Processing"},{"issue":"8","key":"33_CR10","doi-asserted-by":"publisher","first-page":"1470","DOI":"10.1016\/j.jss.2010.03.006","volume":"83","author":"H. Peng","year":"2010","unstructured":"Peng, H., Wang, J., Wang, W.X.: Image watermarking method in multiwavelet domain based on support vector machines. Journal of Systems and Software\u00a083(8), 1470\u20131477 (2010)","journal-title":"Journal of Systems and Software"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks \u2013 ISNN 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31362-2_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:57:56Z","timestamp":1620115076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31362-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642313615","9783642313622"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31362-2_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}