{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:15:15Z","timestamp":1725747315741},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642410970"},{"type":"electronic","value":"9783642410987"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41098-7_15","type":"book-chapter","created":{"date-parts":[[2013,9,4]],"date-time":"2013-09-04T09:16:01Z","timestamp":1378286161000},"page":"223-234","source":"Crossref","is-referenced-by-count":1,"title":["Weighted-Sum Fragile Watermarking in the Karhunen-Lo\u00e8ve Domain"],"prefix":"10.1007","author":[{"given":"Marco","family":"Botta","sequence":"first","affiliation":[]},{"given":"Davide","family":"Cavagnino","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Pomponiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"Digital Watermarking and Steganography","author":"I.J. Cox","year":"2008","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2008)","edition":"2"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TIFS.2011.2162950","volume":"7","author":"H. He","year":"2012","unstructured":"He, H., Chen, F., Tai, H.-M., Kalker, T., Zhang, J.: Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme. IEEE Transactions on Information Forensics and Security\u00a07(1), 185\u2013196 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Botta, M., Cavagnino, D., Pomponiu, V.: KL-F: Karhunen-Lo\u00e8ve Based Fragile Watermarking. In: 5th International Conference on Network and System Security, NSS 2011, pp. 65\u201372 (2011)","DOI":"10.1109\/ICNSS.2011.6059961"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Lin, P.-Y., Lee, J.-S., Chang, C.-C.: Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multimedia Comp. Commun. and Appl.\u00a07(3), 15:1\u201315:20, Article 15 (August 2011)","DOI":"10.1145\/2000486.2000489"},{"key":"15_CR5","unstructured":"Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. of International Conference on Image Processing, vol.\u00a02, pp. 680\u2013683 (1997)"},{"issue":"3","key":"15_CR6","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1109\/TIFS.2008.926994","volume":"3","author":"A.T.S. Ho","year":"2008","unstructured":"Ho, A.T.S., Zhu, X.-Z., Shen, J., Marziliano, P.: Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Transactions on Information Forensics and Security\u00a03(3), 567\u2013569 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-30542-2_6","volume-title":"Advances in Multimedia Information Processing - PCM 2004","author":"V. Oktavia","year":"2005","unstructured":"Oktavia, V., Lee, W.-H.: A Fragile Watermarking Technique for Image Authentication Using Singular Value Decomposition. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol.\u00a03332, pp. 42\u201349. Springer, Heidelberg (2005)"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S. Rawat","year":"2011","unstructured":"Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications\u00a065, 840\u2013847 (2011)","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Dafas, P., Stathaki, T.: Digital image watermarking using block-based Karhunen-Loeve transform. In: Proceedings of the 3rd IEEE International Symposium on Image and Signal Processing and Analysis, pp. 1072\u20131075 (2003)","DOI":"10.1142\/9789812704337_0045"},{"issue":"14","key":"15_CR10","doi-asserted-by":"publisher","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","volume":"282","author":"V. Aslantas","year":"2009","unstructured":"Aslantas, V., Ozer, S., Ozturk, S.: Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Optics Communications\u00a0282(14), 2806\u20132817 (2009)","journal-title":"Optics Communications"},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1117\/1.1426383","volume":"11","author":"M. Barni","year":"2002","unstructured":"Barni, M., Bartolini, F., De Rosa, A., Piva, A.: Color image watermarking in the Karhunen-Loeve transform domain. Journal of Electronic Imaging\u00a011(1), 87\u201395 (2002)","journal-title":"Journal of Electronic Imaging"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Lai, C.-C., Yeh, C.-H., Ko, C.-H., Chiang, C.-Y.: Image Watermarking Scheme Using Genetic Algorithm. In: Proc. of Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 476\u2013479 (2012)","DOI":"10.1109\/ICGEC.2012.103"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Chen, Y.-H., Huang, H.-C.: Robust Image Watermarking Based on Coevolutionary Genetic Algorithm. In: Proc. of Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 484\u2013487 (2012)","DOI":"10.1109\/ICGEC.2012.126"},{"key":"15_CR14","unstructured":"Gonzalez, R.C., Wintz, P.: Digital Image Processing, 2nd edn. Addison-Wesley Publishing Company (1987)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward secure publickeyblockwise fragile authentication watermarking. In: IEE Proceedings - Vision, Image and Signal Processing 2002, vol.\u00a0148(2), pp. 57\u201362 (2002)","DOI":"10.1049\/ip-vis:20020168"},{"key":"15_CR16","unstructured":"The Keccak sponge function family (2012), \n                    \n                      http:\/\/keccak.noekeon.org\/"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z. Wang","year":"2009","unstructured":"Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. IEEE Signal Processing Magazine\u00a026(1), 98\u2013117 (2009)","journal-title":"IEEE Signal Processing Magazine"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Li, L.-J., Wang, G., Li, F.-F.: OPTIMOL: automatic Object Picture collecTion via Incremental Model Learning. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20138 (2008)","DOI":"10.1109\/CVPR.2007.383048"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Botta, M., Cavagnino, D., Pomponiu, V.: \u2018Protecting the Content Integrity of Digital Imagery with Fidelity Preservation\u2019: an improved version. Submitted to ACM Transactions on Multimedia Computing Communications and Applications (2013)","DOI":"10.1145\/2568224"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41098-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T21:36:05Z","timestamp":1558042565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41098-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642410970","9783642410987"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41098-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}