{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T02:40:07Z","timestamp":1739068807899,"version":"3.37.0"},"publisher-location":"Dordrecht","reference-count":8,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048123100"},{"type":"electronic","value":"9789048123117"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-90-481-2311-7_23","type":"book-chapter","created":{"date-parts":[[2009,4,18]],"date-time":"2009-04-18T14:33:41Z","timestamp":1240065221000},"page":"267-276","source":"Crossref","is-referenced-by-count":0,"title":["Image Index Based Digital Watermarking Techniqu for Ownership Claim and Buyer Fingerprinting"],"prefix":"10.1007","author":[{"given":"Sarabjeet S.","family":"Bedi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rabia","family":"Bano","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shekhar","family":"Verma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1_23","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W. Stallings","year":"2005","unstructured":"W. Stallings, \u201cCryptography and Network Security: Principles and Practices,\u201d Pearson Education, Inc., NJ, 3rd Ed., 2005, ISBN 81-7808-902-5.","edition":"3rd"},{"issue":"1","key":"23_CR2_23","first-page":"32","volume":"1","author":"S. S. Bedi","year":"2007","unstructured":"S. S. Bedi and S. Verma, \u201cDigital Watermarking Technology: A Demiurgic Wisecrack Towards Information Security Issues,\u201d Invertis Journal of Science and Technology, vol. 1, no. 1, pp. 32\u201342, 2007.","journal-title":"Invertis Journal of Science and Technology"},{"key":"23_CR3_23","doi-asserted-by":"crossref","unstructured":"A. Kejariwal, \u201cWatermarking,\u201d Magazine of IEEE Potentials, October\/November, 2003, pp. 37\u201340.","DOI":"10.1109\/MP.2003.1238692"},{"issue":"7","key":"23_CR4_23","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F. Hartung","year":"1999","unstructured":"F. Hartung and M. Kutter, \u201cMultimedia Watermarking Techniques,\u201d Proceedings of IEEE, vol. 87, no. 7, pp. 1079\u20131106, July 1999.","journal-title":"Proceedings of IEEE"},{"issue":"3","key":"23_CR5_23","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1117\/1.482612","volume":"7","author":"M. Yeung","year":"1998","unstructured":"M. Yeung and F. Mintzer, \u201cInvisible watermarking for image verification,\u201d Journal of Electric Imaging, vol. 7, no. 3, pp. 578\u2013591, July 1998.","journal-title":"Journal of Electric Imaging"},{"key":"23_CR6_23","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1117\/12.344670","volume-title":"Proceedings of the IS & T\/SPIE Conference on Security and Watermarking of Multimedia Contents","author":"R. Wolfgang","year":"1999","unstructured":"R. Wolfgang and E. Delp, \u201cFragile watermarking using the VW2D watermark,\u201d Proceedings of the IS & T\/SPIE Conference on Security and Watermarking of Multimedia Contents, pp. 204\u2013 213, San Jose, CA, January 1999."},{"key":"23_CR7_23","doi-asserted-by":"crossref","unstructured":"J. Fridrich, \u201cImage watermarking for temper detection,\u201d Proceedings of the IEEE International Conference on Image Processing, vol. 2, pp. 404\u2013408, Chicago, IL, October 1998.","DOI":"10.1109\/ICIP.1998.723401"},{"key":"23_CR8_23","doi-asserted-by":"crossref","unstructured":"P. W. Wong and N. Memon, \u201cSecret and Public key Image Watermarking Schemes for Image Authentication and Ownership Verification,\u201d IEEE Transaction on Image Processing, vol. 10, no. 10, October 2001.","DOI":"10.1109\/83.951543"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Electrical Engineering and Computational Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-2311-7_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T02:03:44Z","timestamp":1739066624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-90-481-2311-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9789048123100","9789048123117"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-2311-7_23","relation":{},"ISSN":["1876-1100"],"issn-type":[{"type":"print","value":"1876-1100"}],"subject":[],"published":{"date-parts":[[2009]]}}}