{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T15:40:38Z","timestamp":1725378038128},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[1999,9,1]],"date-time":"1999-09-01T00:00:00Z","timestamp":936144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[1999,9,1]],"date-time":"1999-09-01T00:00:00Z","timestamp":936144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[1999,9]]},"DOI":"10.1007\/bf02996385","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:51Z","timestamp":1625639631000},"page":"427-437","source":"Crossref","is-referenced-by-count":0,"title":["Introduction au tatouage d\u2019images","Introduction to image watermarking"],"prefix":"10.1007","volume":"54","author":[{"given":"Jean-Luc","family":"Dugelay","sequence":"first","affiliation":[]},{"given":"St\u00e9phane","family":"Roche","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF02996385_CR1","unstructured":"*** http:\/\/www.patents.ibm.com"},{"key":"BF02996385_CR2","doi-asserted-by":"crossref","unstructured":"Swanson (M.), Kobayashi (M.), Tewfik (H.). Multimedia data embedding and watermarking technologies.Proc. IEEE,86, n\u00b0 6, (1998).","DOI":"10.1109\/5.687830"},{"key":"BF02996385_CR3","doi-asserted-by":"crossref","unstructured":"Hartung (F.), Kutter (M.). Multimedia watermarking techniques.Proc. IEEE,87, n\u00b0 7, (July 1999).","DOI":"10.1109\/5.771066"},{"key":"BF02996385_CR4","unstructured":"Delaigle (J.-F.), De Vleeschouwer (C.), Macq Watermarking using a matching model based on the human visual system.\u00c9cole th\u00e9matique CNRS GDR-PRC ISIS: Information Signal Images Marly, le Roi, (1997)."},{"key":"BF02996385_CR5","first-page":"5","volume":"9","author":"A. Kerckhoffs","year":"1883","unstructured":"Kerckhoffs (A.). La crytographie militaire.Journal des Sciences militaires,9, pp. 5\u201338, (1883).","journal-title":"Journal des Sciences militaires"},{"key":"BF02996385_CR6","unstructured":"Roche (S.), Dugelay (J.-L.). M\u00e9canismes de s\u00e9curit\u00e9 li\u00e9s \u00e0 la transmission des images.CORESA, Paris, (1997)."},{"key":"BF02996385_CR7","doi-asserted-by":"crossref","unstructured":"Barni (M.), Bartolini (F.), De Rosa (A.), Piva (A.). Capacity of the watermarking-channel: how many bits can be hidden within a digital image?Proc. of SPIE, Security and Watermarking of Multimedia Contents, Electronic Imaging \u201999,3657, San Jose CA USA, (Jan. 1999).","DOI":"10.1117\/12.344694"},{"key":"BF02996385_CR8","first-page":"207","volume":"1174","author":"J. Smith","year":"1996","unstructured":"Smith (J.), Comiskey Modulation and information hiding in images.Proc. of the First International Workshop on Information Hiding, Springer Lecture Notes in Computer Science,1174, pp. 207\u2013227, (1996).","journal-title":"Proc. of the First International Workshop on Information Hiding, Springer Lecture Notes in Computer Science"},{"key":"BF02996385_CR9","unstructured":"Clark (G. C.), Cain (J. B.). Error correction coding for digital communication.Plenum Press (1988)."},{"key":"BF02996385_CR10","doi-asserted-by":"crossref","unstructured":"Darmstaedter (V.), Delaigle (J.-F.), Nicholson (D.), Macq A block based watermarking technique for mpeg-2 signals: optimization and validation on real digital TV distribution links.Proc. European Conference on Multimedia Applications, Services and Techniques (ECMAST), (1998).","DOI":"10.1007\/3-540-64594-2_95"},{"key":"BF02996385_CR11","unstructured":"Tirkel (A.Z.) et al. Digital image computing, technology and applications, (1993)."},{"issue":"12","key":"BF02996385_CR12","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. J. Cox","year":"1997","unstructured":"Cox (I. J.) et al. Secure spread spectrum watermarking for multimedia,IEEE Transactions Image Processing,6, n\u00b0 12, pp. 1673\u20131687,(1997).","journal-title":"IEEE Transactions Image Processing"},{"key":"BF02996385_CR13","unstructured":"Lee (D.). Call for contributions for jpeg 2000: image coding system.ISO\/IEC JTC1\/SC29\/WG1 N505, (1997)."},{"key":"BF02996385_CR14","unstructured":"*** MPEG-4 Requirements Group - CfP for identification and protection of contentin MPEG-4. ISO document JTC1\/SC29\/WG11 N1714, (1997)."},{"key":"BF02996385_CR15","unstructured":"*** Watermarking for dvd - CfP -http:\/\/www.dvcc.com\/dhsg\/ (1997)."},{"key":"BF02996385_CR16","unstructured":"***Digimarc Corp. identify, manage and track your images. http:\/\/www.digimarc.com\/ (1998)."},{"key":"BF02996385_CR17","unstructured":"*** SureSign from signum.www.signumtech.com."},{"key":"BF02996385_CR18","unstructured":"*** EikonMark.www.generation.net\/~pitas\/sign.html"},{"key":"BF02996385_CR19","unstructured":"Jordan (F.), Kutter (M.). R&D software: jk_pgs. http:\/\/ltssg3.epfl.ch:1248\/kutter\/watermarking\/~pgs."},{"key":"BF02996385_CR20","unstructured":"***Giovanni from bluespike, http:\/\/www.bluespike.com\/giovanni\/gdigmark.html (1998)."},{"key":"BF02996385_CR21","unstructured":"*** Signafy from NEC.www.informix.com"},{"key":"BF02996385_CR22","unstructured":"*** MediaSec technologies LLC. software: Syscop, http:\/\/www.mediasec.com."},{"key":"BF02996385_CR23","doi-asserted-by":"crossref","unstructured":"Petitcolas (F.), Anderson (R. J.). Weaknesses of copyright marking systems.ACM MM (1998).","DOI":"10.1007\/3-540-49380-8_16"},{"key":"BF02996385_CR24","unstructured":"***Projet rnrt Aquamars.http:\/\/www.telecom.gouv.fr\/rnrt\/wprojets.htm (1998)."},{"key":"BF02996385_CR25","doi-asserted-by":"crossref","unstructured":"Mintzer (F.), Braudaway (G. W.), Yeung (M.). Effective and ineffective digital watermarks.IEEE Int. Conf. on Image Proc. ICIP, pp. 9\u201312, (1997).","DOI":"10.1109\/ICIP.1997.631957"},{"key":"BF02996385_CR26","unstructured":"Maitre (H.). Image watermarking: why is watermarking a hard problem?Proc. Korea-France Workshop on Multimedia, (1998)."},{"key":"BF02996385_CR27","unstructured":"Roche (S), Dugelay (J.-L), Molva (R.). Multi resolution access control algorithm based on fractal coding.IEEE Int. Conf. on Image Proc. -ICIP, Lausanne, Switzerland, (September 16-19, 1996)."},{"key":"BF02996385_CR28","unstructured":"Yeung (M. M.), Mintzer (F.). An invisible watermarking technique for image verification.IEEE Int. Conf. on Image Proc\u00e8ssing, pp. 680\u2013683, (1997)."},{"issue":"4","key":"BF02996385_CR29","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/49.668976","volume":"16","author":"M. D. Swanson","year":"1998","unstructured":"Swanson (M. D.), Zhu Tewfik (A.). Multiresolution scene-based video watermarking using perceptual models.IEEE journal on Selected areas in communications,16, n\u00b0 4, pp. 540\u2013550, (May 1998).","journal-title":"IEEE journal on Selected areas in communications"},{"key":"BF02996385_CR30","first-page":"450","volume":"1","author":"F. Bortolini","year":"1998","unstructured":"Bortolini (F.), Barni (M.), Cappellini (V.), Piva (A.). Mask building for perceptually hiding frequency embedded watermarks.Proc. of the Int. Conf. on Image Processing (ICIP\u201998),1, Chicago, Illinois, US, pp. 450\u2013454, (October 1998).","journal-title":"Proc. of the Int. Conf. on Image Processing (ICIP\u201998)"},{"key":"BF02996385_CR31","unstructured":"*** unZign. Is your watermark secure?http:\/\/www.altern.org\/watermark\/"},{"key":"BF02996385_CR32","unstructured":"Petitcolas (F.), Kuhn (M.). StirMark 2 - image watermarking robustness test,http:\/\/www.cl.cam.ac.uk\/~fapp2\/watermarking\/stirmark\/ (1997)."},{"key":"BF02996385_CR33","doi-asserted-by":"crossref","unstructured":"Bender (W.), Gruhl (D.), Morimoto (N.). Techniques for data hiding.Proc. of the SPIE (1995).","DOI":"10.1117\/12.205315"},{"key":"BF02996385_CR34","doi-asserted-by":"crossref","unstructured":"Kutter (M.), Jordan (F.), Bossen (F.). Digital signature of color images using amplitude modulation inProceedings of SPIE Storage and Retrieval for Image and Video Databases, San Jose, USA, (Feb. 13\u201314 1997).","DOI":"10.1117\/12.263442"},{"key":"BF02996385_CR35","unstructured":"Bruyndonckx (O.), Quisquater (J.-J.), Macq Spatial method for copyright labeling of digital images.IEEE Workshop on Nonlinear Signal and Image Processing - NSIP, pp. 456\u2013459, (1995)."},{"key":"BF02996385_CR36","doi-asserted-by":"crossref","unstructured":"Rao (K. R.), Yip (P.). Discrete cosine transform: algorithms, advantages, applications.Academic Press Inc., (1990).","DOI":"10.1016\/B978-0-08-092534-9.50007-2"},{"key":"BF02996385_CR37","unstructured":"Pennebaker (W. B.), Mitchell (J. L.). jpeg still image data compression standard.Van Nostrand Reinhold Company (1992)."},{"key":"BF02996385_CR38","unstructured":"Koch (E.), Zhao (J.). Towards robust and hiden image copyright labeling.IEEE Workshop on Nonlinear Signal and Image Processing - NSIP (1995)."},{"key":"BF02996385_CR39","unstructured":"*** Talisman Acts Project AC019F.http:\/\/nsl.tele.ucl.ac.be\/TAL1SMAN\/ (1998)."},{"key":"BF02996385_CR40","unstructured":"Vetterli (M.), Kovacevic (J.). Wavelets and subband coding.Prentice Hall, (1995)."},{"key":"BF02996385_CR41","volume-title":"Fractal image compression: theory and application to digital images","author":"Y. Fisher","year":"1994","unstructured":"Fisher (Y.), Fractal image compression: theory and application to digital images,Springer Verlag, NY, (1994)."},{"key":"BF02996385_CR42","unstructured":"O\u2019ruanaidh (J. J.), Pun (T.). Rotation, translation and scale invariant digital image watermarking.IEEE Signal Processing Society 1997 Int. Conf. on Image Processing - ICIP, Santa Barbara, CA, (1997)."},{"key":"BF02996385_CR43","first-page":"279","volume-title":"IEEE MultiMedia Signal Processing","author":"H.-J. Wang","year":"1998","unstructured":"Wang (H.-J.), Kuo (C.-C. J). Image protection via watermarking on perceptually significant wavelet coefficients.IEEE MultiMedia Signal Processing -, MMSP, L. A., CA, pp. 279\u2013284, (1998)."},{"key":"BF02996385_CR44","unstructured":"Dugelay (J.-L.). Technique of hiding and retrieval, in particular using fractals, of a digital information inside a multimedia document.Brevet FR 98 04 083 (in French)."},{"key":"BF02996385_CR45","unstructured":"Dugelay (J.-L.), Roche (S.). Method of marking a multimedia document, such as an image, by generating a mark.Brevets FR 98 07 607 et FR 99 02 154."},{"key":"BF02996385_CR46","first-page":"358","volume-title":"IEEE MutliMedia Signal Processing","author":"S. Roche","year":"1998","unstructured":"Roche (S.), Dugelay (J.-L.). Image watermarking based on the fractal transform.IEEE MutliMedia Signal Processing - MMSP, L. A., CA, pp. 358\u2013362, (1998)."},{"issue":"l","key":"BF02996385_CR47","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/83.128028","volume":"2","author":"A. E. Jacquin","year":"1992","unstructured":"Jacquin (A. E.), Image coding based on a fractal theory of iterated contractive image transformations,IEEE Trans. on Image Proc.,2, n\u00b0 l, pp. 18\u201330, (1992).","journal-title":"IEEE Trans. on Image Proc."},{"key":"BF02996385_CR48","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1142\/S0218348X97000681","volume":"5","author":"E. Polidori","year":"1997","unstructured":"Polidori (E.), Dugelay (J.-L.). Zooming using i.f.s.,Fractals,5, Supplementary Issue, pp. 111\u2013123, (1997).","journal-title":"Fractals"},{"key":"BF02996385_CR49","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/BF00393940","volume":"3","author":"J. K. Wu","year":"1996","unstructured":"Wu (J. K.) et al., A fractal-based clustering approach in large visual database systems,Multimedia Tools and Applications,3, pp. 225\u2013244, (1996).","journal-title":"Multimedia Tools and Applications"},{"key":"BF02996385_CR50","doi-asserted-by":"crossref","unstructured":"Vissac (M.), Dugelay (J.-L.), Rose (K.). A fractal-inspired approach to content-based image indexing.IEEE ICIP 99, Kobe, Japan, (October 25-28, 1999).","DOI":"10.1109\/ICIP.1999.822960"},{"key":"BF02996385_CR51","doi-asserted-by":"crossref","unstructured":"Hartung (F.), Girod Digital watermarking of raw and compressed video.Proc. European EOS\/SPIE Symposium on Advanced Imaging and Network Technologies, (1996).","DOI":"10.1117\/12.251278"},{"key":"BF02996385_CR52","unstructured":"Hartung (F.), Girod Digital watermarking of mpeg-2 coded video in the bitstream domain.IEEE ICASSP (1997)."},{"key":"BF02996385_CR53","doi-asserted-by":"crossref","unstructured":"Hartung (F.), Girod Fast public-key watermarking of compressed video.IEEE ICIP, pp. 528\u2013531, (1997).","DOI":"10.1109\/ICIP.1997.647966"},{"key":"BF02996385_CR54","unstructured":"Kalker (T.), Linnartz (J.-P.). Improved watermark detection reliability using filtering before correlation.Proc. IEEE Int. Conf. on Image Processing, (1998)."},{"key":"BF02996385_CR55","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1117\/12.337432","volume":"3528","author":"M. Kutter","year":"1998","unstructured":"Kutter (M.). Watermarking resisting to translation, rotation and scaling.Proc. of SPIE,3528, pp. 423\u2013431, Boston USA, (Nov. 1998).","journal-title":"Proc. of SPIE"},{"key":"BF02996385_CR56","first-page":"187","volume":"1","author":"K. Matsui","year":"1994","unstructured":"Matsui (K.), Tanaka (K.), Video-steganography: how to secretly embed a signature in a picture.Journal of the interactive Multimedia Association Intellectual Property Project,1, pp. 187\u2013206, (1994).","journal-title":"Journal of the interactive Multimedia Association Intellectual Property Project"},{"key":"BF02996385_CR57","unstructured":"Jordan (F.), Vynne (T.). Motion vector watermarking.LTS EPFL, Patent, (1997)."},{"key":"BF02996385_CR58","doi-asserted-by":"crossref","unstructured":"Kutter (M.), Petitcolas (F.). A fair benchmark for image watermarking systems.Proceedings of SPIE 99,3657, (January 1999).","DOI":"10.1117\/12.344672"},{"key":"BF02996385_CR59","unstructured":"Macq Delannay (D.), Boucqueau (J.-M.). Infrastructures de s\u00e9curit\u00e9 pour la transmission des images.CORESA 99, Sophia Antipolis, (juin 99)."},{"key":"BF02996385_CR60","unstructured":"Barnet (R.). Laplacian removal attack (stirmark v2.2).http:\/\/www. cl. cam.ac. uk\/~fapp2\/watermarking\/stirmark\/"},{"key":"BF02996385_CR61","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1117\/12.263419","volume":"3022","author":"S. Craver","year":"1997","unstructured":"Craver (S.), Memon (N.), Yeo (B. L.), Yeung (M.). Can invisible watermarks resolve rightful ownerships?Proc. of SPIE,3022, pp. 310\u2013321,(1997).","journal-title":"Proc. of SPIE"},{"key":"BF02996385_CR62","unstructured":"Gordon (J.). The story of Alice and Bob.http:\/\/www.conceptlabs.co.uk\/alicebob.html. Zurich, (1984)."},{"key":"BF02996385_CR63","doi-asserted-by":"crossref","unstructured":"Boneh (D.), Shaw (J.). Collusion-secure fingerprinting for digital data.IEEE Trans, on Information Theory,44, n\u00b0 5, (1998).","DOI":"10.1109\/18.705568"},{"key":"BF02996385_CR64","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-49380-8_18","volume":"1525","author":"J.-P. Linnartz","year":"1998","unstructured":"Linnartz (J.-P.), Van Dijk (M.). Analysis of the sensitivity attack against electronic watermarks in images information hiding:Second International Workshop, Portland,1525 ofLecture Notes in Computer Science, pp. 258\u2013272, (1998).","journal-title":"Lecture Notes in Computer Science"},{"key":"BF02996385_CR65","unstructured":"Jordan (F.), Kutter (M.), Ebrahimi (T.). Proposal of a watermarking technique for hiding\/retrieving data in compressed and decompressed video.ISO\/IEC JTC1\/SC29\/WG11 MPEG97I, (July 1997)."},{"key":"BF02996385_CR66","doi-asserted-by":"crossref","unstructured":"Bloom (J. A.) et al. Copy protection for DVD video.Proceedings of the IEEE,87, n\u00b0 7, (July 1999).","DOI":"10.1109\/5.771077"}],"container-title":["Annales Des T\u00e9l\u00e9communications"],"original-title":[],"language":"fr","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02996385.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF02996385\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02996385.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T14:51:28Z","timestamp":1725375088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF02996385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,9]]},"references-count":66,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[1999,9]]}},"alternative-id":["BF02996385"],"URL":"https:\/\/doi.org\/10.1007\/bf02996385","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[1999,9]]}}}