{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:02:57Z","timestamp":1743825777588,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319112"},{"type":"electronic","value":"9783642319129"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_29","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"437-449","source":"Crossref","is-referenced-by-count":1,"title":["A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic"],"prefix":"10.1007","author":[{"given":"Teruya","family":"Minamoto","sequence":"first","affiliation":[]},{"given":"Ryuji","family":"Ohura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Baolong, G., Leida, L., Jeng-Shyang, P., Liu, Y., Xiaoyue, W.: Robust Image Watermarking Using Mean Quantization in DTCWT Domain. In: Eighth International Conference on Intelligent Systems Design and Applications, pp. 19\u201322 (2008)","DOI":"10.1109\/ISDA.2008.112"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann Publishers (2008)","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Daubechies, I.: Ten Lectures on Wavelets. SIAM (1992)","DOI":"10.1137\/1.9781611970104"},{"issue":"3","key":"29_CR4","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1006\/acha.2000.0343","volume":"10","author":"N.G. Kingsbury","year":"2001","unstructured":"Kingsbury, N.G.: Complex wavelets for shift invariant analysis and filtering of signals. Applied Computational Harmonic Analysis\u00a010(3), 234\u2013253 (2001)","journal-title":"Applied Computational Harmonic Analysis"},{"key":"29_CR5","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11227-005-0226-y","volume":"33","author":"J.J. Lee","year":"2005","unstructured":"Lee, J.J., Kim, W., Lee, N.Y., Kim, G.Y.: A new incremental watermarking based on dual-tree complex wavelet transform. The Journal of Supercomputing\u00a033, 133\u2013140 (2005)","journal-title":"The Journal of Supercomputing"},{"issue":"3","key":"29_CR6","first-page":"134","volume":"6","author":"S. Mabtoul","year":"2006","unstructured":"Mabtoul, S., Ibn-Elhaj, E., Aboutajdine, D.: A Blind Chaos-Based Complex Wavelet-Domain Image Watermarking Technique. IJCSNS International Journal of Computer Science and Network Security\u00a06(3), 134\u2013139 (2006)","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"issue":"2","key":"29_CR7","first-page":"59","volume":"3","author":"T. Minamoto","year":"2010","unstructured":"Minamoto, T., Aoki, K.: A blind digital image watermarking method using interval wavelet decomposition. International Journal of Signal Processing, Image Processing and Pattern Recognition\u00a03(2), 59\u201372 (2010)","journal-title":"International Journal of Signal Processing, Image Processing and Pattern Recognition"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Moore, R.E., Kearfott, R.B., Cloud, M.J.: Introduction to Interval Analysis. SIAM (2009)","DOI":"10.1137\/1.9780898717716"},{"key":"29_CR9","unstructured":"Rump, S.M.: INTLAB - Interval Laboratory, http:\/\/www.ti3.tu-harburg.de\/rump\/intlab\/"},{"issue":"4","key":"29_CR10","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1142\/S0219691310003602","volume":"8","author":"H. Toda","year":"2010","unstructured":"Toda, H., Zhang, Z.: Perfect translation invariance with a wide range of shapes of Hilbert transform pairs of wavelet bases. International Journal of Wavelets, Multiresolution and Information Processing\u00a08(4), 501\u2013520 (2010)","journal-title":"International Journal of Wavelets, Multiresolution and Information Processing"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:06:19Z","timestamp":1743739579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}