{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:10:27Z","timestamp":1725408627682},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[2000,3]]},"DOI":"10.1007\/bf03001902","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T08:34:26Z","timestamp":1625646866000},"page":"92-100","source":"Crossref","is-referenced-by-count":1,"title":["Technologies du tatouage pour l\u2019authentification et la protection des images","Watermarking technologies for authentication and protection of images"],"prefix":"10.1007","volume":"55","author":[{"given":"Beno\u00eet","family":"Macq","sequence":"first","affiliation":[]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03001902_CR1","unstructured":"Macq (B.) (Guest Editor), Special Issue on Identification & Protection of Multimedia Information,Proceedings of the IEEE, 87, n\u00b0 7, July 1999."},{"key":"BF03001902_CR2","doi-asserted-by":"crossref","unstructured":"Bhattacharjee (S.), Kutter (M.), Compression tolerant image authentication,in Proceedings of the IEEE ICIP, the IEEE ICIP 98, Volume 1 of 3, pp. 435\u2013439, Chicago, October 98.","DOI":"10.1109\/ICIP.1998.723518"},{"key":"BF03001902_CR3","unstructured":"***, ebu\/spmpte task force for harmonized standards for the exchange of programme material as bitstreams,EBU SPMPTE Technical Review, Special Supplement 1998"},{"key":"BF03001902_CR4","doi-asserted-by":"crossref","unstructured":"Blum (L.), Blum (M.), Shub, (M.), A simple unpredictable pseudo-random number generator.SIAM Journal on Computing,15 (2), 1986.","DOI":"10.1137\/0215025"},{"key":"BF03001902_CR5","unstructured":"Knuth (D.E.), The art of computer programming.Addison Wesley, 2nd edition, 1981."},{"issue":"6","key":"BF03001902_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"(W.) Diffie","year":"1976","unstructured":"Diffie (W.), Hellmann (M.E.). New directions in cryptography.IEEE Trans. IT,22 (6): 644\u2013654, 1976.","journal-title":"IEEE Trans. IT"},{"key":"BF03001902_CR7","doi-asserted-by":"crossref","unstructured":"Swanson (M.D.), Zhu (B.), Tewfik (A.H.), Boney (L.),Robust audio watermarking using perceptual masking, Special Issue on Watermarking,Signal Processing,66, n\u00b0 3, pp. 337\u2013356, Else- vier, May 98.","DOI":"10.1016\/S0165-1684(98)00014-0"},{"issue":"4","key":"BF03001902_CR8","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/49.668977","volume":"16","author":"(R.) Ohbuchi","year":"1998","unstructured":"Ohbuchi (R.), Masuda (H.), Aono (M.), Watermarking 3D polygonal models through geometric and topological modifications,IEEE Journal of Selected Areas in Communication,16 (4), pp. 551\u2013560, May 1998.","journal-title":"IEEE Journal of Selected Areas in Communication"},{"key":"BF03001902_CR9","unstructured":"Braudaway (G.W.), Magerlein (K.A.), Mintzer (F.), Protecting publicly available images with a visible image watermarkingIn Proceedings of the SPIE\/IS&T on Optical Security and Counterfeit Deterrence Techniques, Electronic Imaging,3016, pp. 126\u2013133, February 97."},{"key":"BF03001902_CR10","doi-asserted-by":"crossref","unstructured":"Kundur (D.), Hatzinakos (D.), Towards a telltale watermarking technique for tamper-proofing,in Proceedings of the IEEE ICIP 98, Volume 2 of 3, pp. 409\u2013413, Chicago, October 98.","DOI":"10.1109\/ICIP.1998.723403"},{"key":"BF03001902_CR11","unstructured":"Bender (W.), Gruhl (D.), Morimoto (N.), Techniques for data hiding,in Proceedings of the SPIE, San Jose, California, pp. 2420\u20132440, February 95."},{"key":"BF03001902_CR12","doi-asserted-by":"crossref","unstructured":"Cox (), Kilian (J.), Leighton (F.), Shamoon (T.), Secure spread spectrum watermarking for multimedia,IEEE Transaction on Image Processing, 6, n\u00b0 12, pp. 1673\u20131687, 1997","DOI":"10.1109\/83.650120"},{"issue":"3","key":"BF03001902_CR13","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"(J.J.K.) O\u2019Ruanaidh","year":"1998","unstructured":"O\u2019Ruanaidh (J.J.K.), Pun (T.), Rotation, scale and translation invariant spread spectrum digital image watermarking, Special Issue on Watermarking,Signal Processing,66, n\u00b0 3, pp. 303\u2013318, May 1998.","journal-title":"Signal Processing"},{"key":"BF03001902_CR14","doi-asserted-by":"crossref","unstructured":"Meier (W.), Staffelbach (O.), The self shrinking generator. In R. E. Blahut et al, editor. Communications and cryptography: to sides of one tapestry, pp. 287\u2013295.Kluwer Academic Publishers, 1994.","DOI":"10.1007\/978-1-4615-2694-0_28"},{"issue":"3","key":"BF03001902_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"(F.) Hartung","year":"1998","unstructured":"Hartung (F.) andGirod (B.), Watermarking of uncompressed and compressed video, Special Issue on Watermarking,Signal Processing,66, n\u00b0 3, pp. 283\u2013302, May 1998","journal-title":"Signal Processing"},{"issue":"4","key":"BF03001902_CR16","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"(C) Podilchuk","year":"1998","unstructured":"Podilchuk (C), Zeng (W.), Image-adaptive watermarkings using visual models,IEEE Journal of Selected Areas in Communication,16 (4), pp. 525\u2013540, May 1998.","journal-title":"IEEE Journal of Selected Areas in Communication"},{"issue":"4","key":"BF03001902_CR17","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/49.668976","volume":"16","author":"(M.D.) Swanson","year":"1998","unstructured":"Swanson (M.D.), Zhu (B.), Tewfik (A.H.), Multiresolution scene-based video watermarking using perceptual models,IEEE Journal of Slected Areas in Communication,16 (4), pp. 540\u2013550, May 1998","journal-title":"IEEE Journal of Slected Areas in Communication"},{"issue":"3","key":"BF03001902_CR18","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/S0165-1684(98)00013-9","volume":"66","author":"(J.F.) Delaigle","year":"1998","unstructured":"Delaigle (J.F.), De Vleeschouwer (C.), Macq (B.), Watermarking algorithm based on a human visual model, Special Issue on Watermarking,Signal Processing,66, n\u00b0 3, pp. 319\u2013336, May 1998","journal-title":"Signal Processing"},{"key":"BF03001902_CR19","volume-title":"Attacks on copyright marking systems,in Information Hiding: second international workshop, Lecture notes in Computer Science","author":"(F.) Peticolas","year":"1998","unstructured":"Peticolas (F.), Anderson (R.J.), Kuhn (M.G.), Attacks on copyright marking systems,in Information Hiding: second international workshop, Lecture notes in Computer Science.Springer Verlag, Berlin, Germany, 1998"},{"key":"BF03001902_CR20","doi-asserted-by":"crossref","unstructured":"Lacy (J.) et al, Intellectual property protection systems and digital watermarking,Information Hiding Workshop, Portland, Oregon, April 15\u201317 1998","DOI":"10.21236\/ADA385324"},{"key":"BF03001902_CR21","doi-asserted-by":"crossref","unstructured":"Kundur (D.), Hatzinakos (D.), Towards a telltale watermarking technique for tamper-proofing,1CIP 1998, 2, pp.","DOI":"10.1109\/ICIP.1998.723403"},{"key":"BF03001902_CR22","first-page":"437","volume":"2","author":"(M.) Wu","year":"1998","unstructured":"Wu (M.), Bede (X.), Watermarking for image authentication,IEEEICIP 1998,2, pp. 437\u2013441.","journal-title":"IEEEICIP"},{"key":"BF03001902_CR23","first-page":"404","volume":"2","author":"(J.) Fridrich","year":"1998","unstructured":"Fridrich (J.), Image watermarking for tamper detection,IEEE ICIP 1998,2, pp. 404\u2013408.","journal-title":"IEEE ICIP"},{"key":"BF03001902_CR24","doi-asserted-by":"crossref","unstructured":"Wolfgang (R.B.), Delp (E.J.), A watermarking for digital images,IEEE ICIP 96,3, pp. 219\u2013222.","DOI":"10.1109\/ICIP.1996.560423"},{"key":"BF03001902_CR25","unstructured":"Tanaka (K.), Nakamuara (Y.), Matsui (K.), Embedding secret information into a dithered multilevel image,in Proc. 1990,IEEE Military Com. Conf, Sept. 1990, pp. 216\u2013220"},{"key":"BF03001902_CR26","first-page":"86","volume":"2","author":"(R.G.) Van Schyndel","year":"1994","unstructured":"Van Schyndel (R.G.), Tirkel (A.Z.) andOsborne (CF.),A digital watermark,IEEE ICIP 1994, vol. 2, pp. 86\u201389","journal-title":"IEEE ICIP"},{"key":"BF03001902_CR27","unstructured":"Pitas (I.) and Kaskalis (T.),Applying signatures on digital images, Proc. Of the IEEE Workshop on Non Linear Image and Signal Processing, June 1995, pp. 460\u2013463"},{"key":"BF03001902_CR28","unstructured":"Koch (E.) and Zhao (J.),Toward robust and hidden image copyright labeling, Proc. Of the IEEE Workshop on Non Linear Image and Signal Processing, June 1995, pp. 452\u2013455"},{"key":"BF03001902_CR29","volume-title":"Assuring ownership rights for digital images","author":"(G.) Caronni","year":"1995","unstructured":"Caronni (G.), Assuring ownership rights for digital images, Proc VIS95, Session \u00ab Reliable IT Systems \u00bb, Vieweg, Germany 1995"},{"key":"BF03001902_CR30","doi-asserted-by":"crossref","unstructured":"Rey (C), Dugelay (J.-L.), Blind detection of malicious alterations on still images using robust watermarks,in Proc. iee Secure Images and Image Authentication, London, 10 April 2000.","DOI":"10.1049\/ic:20000218"}],"container-title":["Annales Des T\u00e9l\u00e9communications"],"original-title":[],"language":"fr","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03001902.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03001902\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03001902.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T15:36:25Z","timestamp":1725377785000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03001902"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3]]},"references-count":30,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2000,3]]}},"alternative-id":["BF03001902"],"URL":"https:\/\/doi.org\/10.1007\/bf03001902","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2000,3]]}}}