{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T05:20:17Z","timestamp":1738473617080,"version":"3.35.0"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2002,3,1]],"date-time":"2002-03-01T00:00:00Z","timestamp":1014940800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. &amp; Technol."],"published-print":{"date-parts":[[2002,3]]},"DOI":"10.1007\/bf02962205","type":"journal-article","created":{"date-parts":[[2008,9,27]],"date-time":"2008-09-27T19:59:04Z","timestamp":1222545544000},"page":"129-139","source":"Crossref","is-referenced-by-count":10,"title":["Digital image watermarking based on discrete wavelet transform"],"prefix":"10.1007","volume":"17","author":[{"given":"Wei","family":"Ding","sequence":"first","affiliation":[]},{"given":"Weiqi","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Dongxu","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF02962205_CR1","unstructured":"Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhu. Information hiding\u2014A survey. InProc. IEEE, 1999, 87(7): 1062\u20131078."},{"issue":"3&4","key":"BF02962205_CR2","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A. Technique for data hiding.IBM Systems Journal, 1996, 35(3&4): 313\u2013335.","journal-title":"IBM Systems Journal"},{"key":"BF02962205_CR3","unstructured":"Bender W. Data Hiding. News in the Future, MIT Media Laboratory, unpublished lecture notes, 1994."},{"key":"BF02962205_CR4","unstructured":"Ingemar J Cox, Joe Kilian, Thomson F Leighton, Talal Shamoon. A Secure, Imperceptable yet Perceptually Salient, Spread Spectrum Watermark for Multimedia. http:\/\/www.neci.nj.nec.com\/tr\/neci-tr-95-10.ps"},{"issue":"12","key":"BF02962205_CR5","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"Ingemar J Cox","year":"1997","unstructured":"Ingemar J Cox, Joe Kilian, Thomson F Leighton, Talal Shamoon. Secure spread spectrum watermarking for multimedia.IEEE Trans. on Image Processing, 1997, 6(12): 1673\u20131687.","journal-title":"IEEE Trans. on Image Processing"},{"issue":"4","key":"BF02962205_CR6","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"Ingemar J Cox","year":"1998","unstructured":"Ingemar J Cox, Jean-Paul M G Linnartz. Some general methods for tampering with watermarks.IEEE Journal on Selected Areas in Communications, 1998, 16(4): 587\u2013593.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"BF02962205_CR7","doi-asserted-by":"crossref","unstructured":"Swanson D, Tewfik H. Multimedia data\u2014Embedding and watermarking technologies. InProc. the IEEE, 1998, 86(6): 1064\u20131087.","DOI":"10.1109\/5.687830"},{"key":"BF02962205_CR8","doi-asserted-by":"crossref","unstructured":"Raymond B Wolfgang, Christine I Podilchuk, Edward J Delp. Perceptual watermarks for digital images and video. InProc. the IEEE, 1999, 87(7): 1108\u20131126.","DOI":"10.1109\/5.771067"},{"key":"BF02962205_CR9","doi-asserted-by":"crossref","unstructured":"Deepa Kundur, Dimitrios Hatzinakos. Digital watermarking for telltale tamper proofing and authentication. InProc. the IEEE, 1999, 87(7): 1167\u20131180.","DOI":"10.1109\/5.771070"},{"key":"BF02962205_CR10","doi-asserted-by":"crossref","unstructured":"Jack T Brassil, Steven Low, Nicholas F Maxemchuk. Copyright protection for the electronic distribution of text documents. InProc. the IEEE, 1999, 87(7): 1181\u20131196.","DOI":"10.1109\/5.771071"},{"issue":"4","key":"BF02962205_CR11","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/285293.285301","volume":"2","author":"Hal Berghel","year":"1998","unstructured":"Hal Berghel. Digital watermarking makes its mark.NetWorker: The Craft of Network Computing, 1998, 2(4): 30\u201339.","journal-title":"NetWorker: The Craft of Network Computing"},{"issue":"7","key":"BF02962205_CR12","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/278476.278487","volume":"41","author":"Fred Mintzer","year":"1998","unstructured":"Fred Mintzer, Gordon W Braudaway, Alan E Bell. Opportunities for watermarking standards.Communications of the ACM, 1998, 41(7): 57\u201364.","journal-title":"Communications of the ACM"},{"key":"BF02962205_CR13","doi-asserted-by":"crossref","unstructured":"George Voyatzis, Ioannis Pitas. The use of watermarks in the protection of digital multimedia products. InProc. the IEEE, 1999, 87(7): 1197\u20131207.","DOI":"10.1109\/5.771072"},{"key":"BF02962205_CR14","doi-asserted-by":"crossref","unstructured":"Juan R Hernandez, Fernando Perez-Gonzalez. Statistical analysis of watermarking schemes for copyright protection of images. InProc. the IEEE, 1999, 87(7): 1142\u20131166.","DOI":"10.1109\/5.771069"},{"issue":"4","key":"BF02962205_CR15","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/103085.103089","volume":"34","author":"G K Wallace","year":"1991","unstructured":"Wallace G K. The JPEG still picture compression standard.Communications of the ACM, 1991, 34(4): 31\u201344.","journal-title":"Communications of the ACM"},{"key":"BF02962205_CR16","doi-asserted-by":"crossref","unstructured":"Barni M, Bartolini F, Cappellini V, Piva A. Robust watermarking of still images for copyright protection. InProc. Digital Signal Processing, 1997, pp. 499\u2013502.","DOI":"10.1109\/ICDSP.1997.628384"},{"key":"BF02962205_CR17","doi-asserted-by":"crossref","unstructured":"Piva A, Barni M, Bartolini F, Cappellini V. DCT-based watermark recovering without resorting to the uncorrupted original. InProc. International Conference on Image Processing, 1997, Vol. 1, pp. 520\u2013523.","DOI":"10.1109\/ICIP.1997.647964"},{"key":"BF02962205_CR18","doi-asserted-by":"crossref","unstructured":"Huang Jiwu, Yun Q Shi. Adaptive image watermarking scheme based on visual masking.Electronics Letters Online No: 19980570, 1998, pp. 748\u2013750.","DOI":"10.1049\/el:19980545"},{"issue":"1","key":"BF02962205_CR19","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"Hsu Chiou-Ting","year":"1999","unstructured":"Hsu Chiou-Ting, Wu Ja-Ling. Hidden digital watermarks in images.IEEE Trans. Image Processing, 1999, 8(1): 58\u201368","journal-title":"IEEE Trans. Image Processing"},{"issue":"1","key":"BF02962205_CR20","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/30.663749","volume":"44","author":"Hsu Chiou-Ting","year":"1998","unstructured":"Hsu Chiou-Ting, Wu Ja-Ling. DCT-based watermarking for video.IEEE Trans. Consumer Electronics, 1998, 44(1): 206\u2013216.","journal-title":"IEEE Trans. Consumer Electronics"},{"issue":"8","key":"BF02962205_CR21","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1109\/82.718818","volume":"45","author":"Hsu Chiou-Ting","year":"1998","unstructured":"Hsu Chiou-Ting, Wu Ja-Ling. Multiresolution watermarking for digital images.IEEE Trans. Circuits and Systems-II: Analog and Digital Signal Processing, 1998, 45(8): 1097\u20131101.","journal-title":"IEEE Trans. Circuits and Systems-II: Analog and Digital Signal Processing"},{"key":"BF02962205_CR22","doi-asserted-by":"crossref","unstructured":"Weili Tang, Yoshinao AOKI. A DCT-based coding of images in watermarking. InProc. International Conference on Information, Communications and Signal Processing, 1997, pp. 510\u2013512.","DOI":"10.1109\/ICICS.1997.647150"},{"key":"BF02962205_CR23","unstructured":"Generic Coding of Moving Pictures and Associated Audio Information: Video. ISO\/IEC IS 13818-2, 1995."},{"key":"BF02962205_CR24","unstructured":"Video Coding For Low Bitrate Communication. Draft ITU-T Recommendation H.263, ITU, 1995."},{"key":"BF02962205_CR25","doi-asserted-by":"crossref","unstructured":"Jana Dittmann, Mark Stabenau, Ralf Steinmetz. Robust MPEG video watermarking technologies. InProc. the 6th ACM International Conference on Multimedia, 1998, pp. 71\u201380.","DOI":"10.1145\/290747.290757"},{"key":"BF02962205_CR26","doi-asserted-by":"crossref","unstructured":"Xia Xiang-Gen, Charles G Boncelet, Gonzalo R Arce. A multiresolution watermark for digital images. InProc. IEEE, 1997, pp. 548\u2013551.","DOI":"10.1109\/ICIP.1997.647971"},{"key":"BF02962205_CR27","unstructured":"Zeng Wenjun, Liu Bede. On resolving rightful ownerships of digital images by invisible watermarks. InProc. IEEE, 1997, pp. 552\u2013555."},{"issue":"4","key":"BF02962205_CR28","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"Christine I Podichuk","year":"1998","unstructured":"Christine I Podichuk, Wenjun Zeng. Image-adaptive watermarking using visual models.IEEE Journal on Selected Areas in Communications, 1998, 16(4): 525\u2013539.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"BF02962205_CR29","doi-asserted-by":"crossref","unstructured":"Zhu Wengwu, Xiong Zixiang, Zhang Ya-Qin. Multiresolution watermarking for images and video: A unified approach. InProc. International Conference on Image Processing, 1998, Vol. 1, pp. 465\u2013468.","DOI":"10.1109\/ICIP.1998.723530"},{"issue":"6","key":"BF02962205_CR30","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1109\/76.728421","volume":"8","author":"Ioannis Pitas","year":"1998","unstructured":"Ioannis Pitas. A method for watermark casting on digital images.IEEE Trans. Circuits and Systems for Video Technology, 1998, 8(6): 775\u2013780.","journal-title":"IEEE Trans. Circuits and Systems for Video Technology"},{"key":"BF02962205_CR31","doi-asserted-by":"crossref","unstructured":"Voyatzis G, Pitas I. Chaotic watermarks for embedding in the spatial digital image domain. InProc. IEEE, 1998, pp. 432\u2013436.","DOI":"10.1109\/ICIP.1998.723411"},{"key":"BF02962205_CR32","doi-asserted-by":"crossref","unstructured":"Pitas I. A method for signature casting on digital images. InProc. International Conference on Image Processing, 1996, Vol. 3, pp. 215\u2013218.","DOI":"10.1109\/ICIP.1996.560422"},{"key":"BF02962205_CR33","doi-asserted-by":"crossref","unstructured":"Raymond B Wolfgang, Edward J Delp. A Watermark for digital images. InProc. IEEE, 1996, pp. 219\u2013222.","DOI":"10.1109\/ICIP.1996.560423"},{"key":"BF02962205_CR34","doi-asserted-by":"crossref","unstructured":"Van Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark. InProc. IEEE, 1994, pp. 86\u201390.","DOI":"10.1109\/ICIP.1994.413536"},{"key":"BF02962205_CR35","doi-asserted-by":"crossref","unstructured":"Gang Qu, Miodrag Potkonjak. Analysis of watermarking techniques for graph color problem. InProc. the 1998 IEEE\/ACM International Conference on Computer-aided Design, 1998, pp. 190\u2013193.","DOI":"10.1145\/288548.288607"},{"key":"BF02962205_CR36","doi-asserted-by":"crossref","unstructured":"Mohan S Kankanhalli, K R Ramakrishnan, Rajmohan. Content based watermarking of images. InProc. the 6th ACM International Conference on Multimedia, 1998, pp. 61\u201370.","DOI":"10.1145\/290747.290756"},{"key":"BF02962205_CR37","doi-asserted-by":"crossref","unstructured":"Emil Praun, Hugues Hoppe, Adam Finkelstein. Robust mesh watermarking. InProc. SIGGRAPH\u201999, 1999, pp. 49\u201356.","DOI":"10.1145\/311535.311540"},{"issue":"4","key":"BF02962205_CR38","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/49.668977","volume":"16","author":"Ryutarou Ohbuchi","year":"1998","unstructured":"Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono. Watermarking three-dimensional polygonal models through geometric and topological modifications.IEEE Journal on Selected Areas in Communications, 1998, 16(4): 551\u2013560.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"BF02962205_CR39","doi-asserted-by":"crossref","unstructured":"M J J J B Maes, C W A M van Overveld. Digital watermarking by geometric warping. InProc. IEEE International Conference on Image Processing, 1998, Vol. 1, pp. 424\u2013426.","DOI":"10.1109\/ICIP.1998.723408"},{"key":"BF02962205_CR40","unstructured":"Puate J, Jordan F. Using fractal compression scheme to embed a digital signature into an image. InVideo Techniques and Software for Full-Service Networks, Chiueh T, Tescher A G (eds.), Vol.2915 of SPIE Proceedings, 1996, pp. 108\u2013118."},{"key":"BF02962205_CR41","unstructured":"Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn. Attacks on Copyright Marking Systems. Information Hiding, Second International Workshop, IH\u201998, Proceedings, David Aucsmith (ed.), LNCS 1525, Springer-Verlag, 1998, pp. 219\u2013239."},{"key":"BF02962205_CR42","doi-asserted-by":"crossref","unstructured":"Fabien A P Petitcolas, Ross J Anderson. Evaluation of copyright marking systems InProc. IEEE Multimedia Systems (ICMCS\u201999), 1999, Vol. 1, pp. 574\u2013579, 7\u201311.","DOI":"10.1109\/MMCS.1999.779264"},{"key":"BF02962205_CR43","doi-asserted-by":"crossref","unstructured":"Barnett R, Pearson D. Attack operators for digitally watermarked images. InIEEE Proc. Vision, Image and Signal Processing 145, 1998, pp. 271\u2013279.","DOI":"10.1049\/ip-vis:19982151"},{"issue":"4","key":"BF02962205_CR44","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"Scott Craver","year":"1998","unstructured":"Scott Craver, Nasir Memon, Boon-Lock Yeo, Minerva M Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications.IEEE Journal on Selected Areas in Communications, 1998, 16(4): 573\u2013586.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"BF02962205_CR45","first-page":"69","volume":"19","author":"Cao Hanqiang","year":"1998","unstructured":"Cao Hanqiang, Zhu Guangxi, Zhu Yaoting, Zhang Zhengbing. Embedding a signature in an image based on fractal compress transformations.Journal of China Institute of Communications, 1998, 19(5): 69\u201374.","journal-title":"Journal of China Institute of Communications"},{"issue":"1","key":"BF02962205_CR46","first-page":"21","volume":"23","author":"Niu Xin-xin","year":"2000","unstructured":"Niu Xin-xin, Yang Yi-xian. A new algorigthm for digital watermarking based on the wavelet transform.Chinese Journal of Computers, 2000, 23(1): 21\u201327 (in Chinese).","journal-title":"Chinese Journal of Computers"},{"issue":"1","key":"BF02962205_CR47","first-page":"47","volume":"27","author":"Chang Qing","year":"2000","unstructured":"Chang Qing. Digital watermarking and copyright protection of multimedia.Digital Communication, 2000, 27(1): 47\u201349 (in Chinese).","journal-title":"Digital Communication"},{"key":"BF02962205_CR48","first-page":"70","volume":"4","author":"He Junhui","year":"1999","unstructured":"He Junhui, Cai Hantian. Digital watermarking technique on frequency domain of digital image.Communication Security, 1999, (4): 70\u201374 (in Chinese).","journal-title":"Communication Security"},{"key":"BF02962205_CR49","first-page":"42","volume":"2","author":"Hu Jun","year":"1998","unstructured":"Hu Jun, Liu Zhenhua, Shu Chang. One-direction digital watermarking.Cryptography and Information, 1998, (2): 42\u201349 (in Chinese).","journal-title":"Cryptography and Information"},{"issue":"3","key":"BF02962205_CR50","first-page":"71","volume":"11","author":"Ding Wei","year":"1999","unstructured":"Ding Wei, Yan Weiqi, Qi Dongxu. Digital image watermarking based on discrete cosine transform.Journal of North China Univ. of Tech., 1999, 11(3): 71\u201375. (in Chinese).","journal-title":"Journal of North China Univ. of Tech."},{"key":"BF02962205_CR51","unstructured":"Ding Wei, Yan Weiqi, Qi Dongxu. Digital watermark image embedding based on U-system. InProc. the 6th International Conference on Computer Aided Design & Computer Graphics, Wen Hui Publishers, Dec., 1999, Vol. 3, pp. 893\u2013899."},{"key":"BF02962205_CR52","unstructured":"Kangkang Yin, Zhigeng Pan, Hui Xiang, Jiaoying Shi. A secure transaction model based on digital steganography and watermarking. InProc. the 6th International Conference on Computer Aided Design & Computer Graphics, Wen Hui Publishers, 1999, 3: 1319\u20131322."},{"key":"BF02962205_CR53","doi-asserted-by":"crossref","unstructured":"Maxemchuk N F. Electronic document distribution.ATT Technical Journal, 1994, pp. 73\u201380.","DOI":"10.1002\/j.1538-7305.1994.tb00612.x"},{"key":"BF02962205_CR54","unstructured":"Petitcolas F A P. Mp3Stego, 1998. http:\/\/www.cl.cam.ac.uk\/~fapp2\/steganography\/mp3stego\/"},{"key":"BF02962205_CR55","unstructured":"Information Technology Generic Coding of Moving Pictures and Associated Audio Information Part 3: Audio., British Standard, BSI, implementation of ISO\/IED 13818-3: 1995."},{"key":"BF02962205_CR56","unstructured":"Cui Jintai, Cheng Dongxing. An Introduction to Wavelet. Xi\u2019an Jiaotong Univ. Press, 1995 (in Chinese)."},{"issue":"4","key":"BF02962205_CR57","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/18.9761","volume":"34","author":"I Daubechies","year":"1988","unstructured":"Daubechies I. Time-frequency localization operators: A geometric phase space approach.IEEE Trans. Information Theory, 1988, 34(4): 605\u2013612.","journal-title":"IEEE Trans. Information Theory"},{"issue":"5","key":"BF02962205_CR58","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/18.57199","volume":"36","author":"I Daubechies","year":"1990","unstructured":"Daubechies I. The wavelet transform, time-frequency localization and signal analysis.IEEE Trans. Information Theory, 1990, 36(5): 961\u20131005.","journal-title":"IEEE Trans. Information Theory"},{"issue":"7","key":"BF02962205_CR59","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"S G Mallat","year":"1989","unstructured":"Mallat S G. A theory of multiresolution signal decomposition: The wavelet representation.IEEE Trans. Pattern Analysis and Machine Intelligence, 1989, 11(7): 674\u2013693.","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"issue":"2","key":"BF02962205_CR60","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/83.136597","volume":"1","author":"Marc Antonini","year":"1992","unstructured":"Marc Antonini, Michel Barlaud, Pierre Mathieu, Ingrid Daubechies. Image coding using wavelet transform.IEEE Trans. Image Processing, 1992, 1(2): 205\u2013220.","journal-title":"IEEE Trans. Image Processing"},{"key":"BF02962205_CR61","unstructured":"Moccagatta I, Fukunaga S, Nakaya Y, Son S H. MPEG4 Video Verification Model VM12.0 1999."},{"key":"BF02962205_CR62","doi-asserted-by":"crossref","unstructured":"Li Shipeng, Li Weiping, Sun Hongqiao, Wu Zhixiong. Shape adaptive wavelet coding. InProc. IEEE, 1998, pp. 281\u2013284.","DOI":"10.1109\/ISCAS.1998.694465"},{"key":"BF02962205_CR63","doi-asserted-by":"crossref","unstructured":"Jorn Ostermann, Euee S Jang, Jae-Seob Shin, Tsuhan Chen. Coding of arbitrarily shaped video objects in MPEG-4. InProc. IEEE Int. Conf. Image Processing. Santa Barbara, 1997, pp. 496\u2013499.","DOI":"10.1109\/ICIP.1997.647958"},{"issue":"9","key":"BF02962205_CR64","first-page":"838","volume":"21","author":"Ding Wei","year":"1998","unstructured":"Ding Wei, Qi Dong-Xu. Digital image transform and information hilding and covering technique.Chinese Journal of Computers, 1998, 21(9): 838\u2013843.","journal-title":"Chinese Journal of Computers"},{"key":"BF02962205_CR65","unstructured":"Ding Wei, Yan Wei-Qi, Qi Dong-Xu. Digital image scrambling technology based on Gray code. InProc. the 6th International Conference on Computer Aided Design & Computer Graphics, Wen Hui Publishers, Dec., 1999, Vol. 3, pp. 900\u2013904."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02962205.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02962205\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02962205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T07:49:48Z","timestamp":1738396188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02962205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,3]]},"references-count":65,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,3]]}},"alternative-id":["BF02962205"],"URL":"https:\/\/doi.org\/10.1007\/bf02962205","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2002,3]]}}}