{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:30:29Z","timestamp":1761647429915,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055486","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"227-240","source":"Crossref","is-referenced-by-count":16,"title":["Robustness and security of digital watermarks"],"prefix":"10.1007","author":[{"given":"Lesley R.","family":"Matheson","sequence":"first","affiliation":[]},{"given":"Stephen G.","family":"Mitchell","sequence":"additional","affiliation":[]},{"given":"Talal G.","family":"Shamoon","sequence":"additional","affiliation":[]},{"given":"Robert E.","family":"Tarjan","sequence":"additional","affiliation":[]},{"given":"Francis","family":"Zane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"volume-title":"Lecture Notes in Computer Science 1174","year":"1996","key":"18_CR1","unstructured":"R. Anderson, Ed., Information Hiding, First International Workshop Proceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin, 1996."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"W. Bender, D. Gruhl, N. Marimoto, and A. La, \u201cTechniques for data hiding,\u201d IBM Systems Journal 35 (1996).","DOI":"10.1147\/sj.353.0313"},{"key":"18_CR3","first-page":"180","volume-title":"Crypto '85, Lecture Notes in Computer Science 218","author":"G.R. Blakely","year":"1985","unstructured":"G.R. Blakely, C. Meadors, and G.B. Purdy, \u201cFingerprinting long unforgiving messages,\u201d Crypto '85, Lecture Notes in Computer Science 218, Springer-Verlag, Berlin (1985), pp.180\u2013189."},{"key":"18_CR4","first-page":"452","volume-title":"Crypto '95, Lecture Notes in Computer Science 963","author":"D. Boneh","year":"1995","unstructured":"D. Boneh and J. Shaw, \u201cCollusion-secure fingerprinting for digital data,\u201d Crypto '95, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452\u2013465."},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1016\/0167-8655(96)00062-1","volume":"17","author":"R.D. Brandt","year":"1996","unstructured":"R.D. Brandt and F. Lin, \u201cRepresentations that uniquely characterize images modulo translation, rotation, and scaling,\u201d Pattern Recognition Letters 17 (1996), pp. 1001\u20131015.","journal-title":"Pattern Recognition Letters"},{"key":"18_CR6","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/ICIP.1997.647965","volume":"I","author":"G. W. Braudaway","year":"1997","unstructured":"G. W. Braudaway, \u201cProtecting publicly-available images with an invisible image watermark,\u201d Proc. IEEE Int. Conf. on Image Procesing, ICIP-97 (1997), Vol. I, pp. 524\u201351.","journal-title":"Proc. IEEE Int. Conf. on Image Procesing, ICIP-97"},{"key":"18_CR7","first-page":"452","volume-title":"Crypto '94, Lecture Notes in Computer Science 963","author":"B. Chor","year":"1995","unstructured":"B. Chor, A. Fiat, and M. Naor, \u201cTracing traitors,\u201d Crypto '94, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452\u2013465."},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"I. Cox, J. Kilian, T. Leighton, and T. Shamoon, \u201cSecure spread spectrum watermarking for multimedia,\u201d IEEE Trans. on Image Processing 6 (1997), 1673\u20131687.","journal-title":"IEEE Trans. on Image Processing"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"I. Cox and J.-P. Linnartz, \u201cPublic watermarks and resistance to tampering,\u201d Proc. IEEE Conf. on Image Processing (1997), CD-ROM.","DOI":"10.1109\/ICIP.1997.632226"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"S. Craver, N. Memon, B.L. Yeo, and M. Yeung, \u201cCan invisible watermarks resolve rightful ownerships?\u201d, IBM Research Report RC 20509 (1996).","DOI":"10.1117\/12.263419"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"J. ridrich, A.C. Baldoza, and R.J. Simard, \u201cRobust digital watermarking based on key-dependent basis functions,\u201d Preliminary Proc. Second International Information Hiding Workshop (1998).","DOI":"10.1007\/3-540-49380-8_11"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"D.L. Hecht, \u201cEmbedded data glyph technology for hardcopy digital documents,\u201d SPIE 2171 (1995).","DOI":"10.1117\/12.175304"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"A. Herrigal, J.J \u00f3 Ruanaidh, W. Peterson, S. Pereira, and T. Pun, \u201cSecure copyright protection techniques for digital images,\u201d Preliminary Proceedings of the Second International Information Hiding Workshop (1998).","DOI":"10.1007\/3-540-49380-8_13"},{"key":"18_CR14","unstructured":"Proceedings of the IEEE International Conference on Image Processing, ICIP-47, Vols. I\u2013III, IEEE Computer Society, Los Alamitos, CA, 1997."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"N.F. Johnson and S. Sajodia, \u201cSteganalysis of images created using current steganography software,\u201d Preliminary Proc. Second International Information Hiding Workshop (1998).","DOI":"10.1007\/3-540-49380-8_19"},{"key":"18_CR16","volume-title":"Some results on the information capacity of authentication channels","author":"D. Karakos","year":"1997","unstructured":"D. Karakos and A. Papamarcou, \u201cSome results on the information capacity of authentication channels,\u201d Dept. of Electrical Engineering, University of Maryland, College Park, MD, manuscript, 1997."},{"key":"18_CR17","unstructured":"J. Kilian, F.T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, \u201cResistance of digital fingerprints to collusional attacks,\u201d unpublished manuscript (1997)."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"J. Lacy, S.R. Quackenbush, A. Reibman, and J.H. Snyder, \u201cIntellectual property protection systems and digital watermarking,\u201d Preliminary Proceedings of the Second International Information Hiding Workshop (1998).","DOI":"10.21236\/ADA385324"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"J. P. Linnartz, T. Kalker, and G. Depovere, \u201cModelling the false alarm and missed detection rate for electronic watermarks,\u201d Preliminary Proceedings of the Second International Information Hiding Workshop (1998)","DOI":"10.1007\/3-540-49380-8_23"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"J. P. Linnartz and M. Van Dijk, \u201cAnalysis of the sensitivity attack against electronic watermarks in images,\u201d Preliminary Proceedings of the Second International Information Hiding Workshop (1998).","DOI":"10.1007\/3-540-49380-8_18"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"M. Maes, \u201cTwin peaks: the histogram attack on fixed depth image watermarks,\u201d Preliminary Proc. Second International Information Hiding Workshop (1998).","DOI":"10.1007\/3-540-49380-8_20"},{"key":"18_CR22","unstructured":"K.A.Magerlein, G.W. Braudaway, and F.C. Mintzer, \u201cProtecting publicallyavailable images with a visible image watermark,\u201d Proc. SPIE Conf. on Optical Security and Counterfeit Deterrence Techniques, SPIE 2659 (1996), pp. 126\u2013132."},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1049\/ip-vis:19960711","volume":"143","author":"J. \u00f3. Ruanaidh","year":"1996","unstructured":"J.J.K \u00f3 Ruanaidh, W. J. Dowling, and F. M. Boland, \u201cWatermarking digital images for copyright protection,\u201d IEE Proc. on Vision, Image and Signal Processing 143 (1996), pp. 250\u2013256.","journal-title":"IEE Proc. on Vision, Image and Signal Processing"},{"key":"18_CR24","unstructured":"J.J.K. \u00f3 Ruanaidh, W.J. Dowling, and F.M. Boland, \u201cPhase watermarking of digital images,\u201d Proc. IEEE International Conference on Image Processing ICIP-96 (1996), pp. 239\u2013242."},{"key":"18_CR25","first-page":"536","volume":"I","author":"J. \u00f3. Ruanaidh","year":"1997","unstructured":"J. \u00f3 Ruanaidh and T. Pun, \u201cRotation, translation and scale invariant digital image watermarking,\u201d Proceedings 1997 IEEE International Conference on Image Processing (1997), Vol. I, pp. 536\u2013539.","journal-title":"Proceedings 1997 IEEE International Conference on Image Processing"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"F. Peticolas, R. Anderson, and M. Kuhn, \u201cAttacks on copyright marking systems,\u201d Preliminary Proc. Second International Information Hiding Workshop (1998).","DOI":"10.1007\/3-540-49380-8_16"},{"key":"18_CR27","first-page":"84","volume-title":"Lecture Notes in Computer Science 1070","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann and M. Shaunter, \u201cAnonymous fingerprinting, (extended abstract),\u201d EUROCRYPT '96, Lecture Notes in Computer Science 1070, Springer-Verlag, Berlin (1996), pp. 84\u201395."},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner, \u201cAsymmetric fingerprinting for larger collusions,\u201d 4th ACM Conf. on Computer and Communications Security (1997), pp. 151\u2013160.","DOI":"10.1145\/266420.266453"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner, \u201cAnonymous fingerprinting,\u201d IBM Research Report RZ 2221 (1996).","DOI":"10.1007\/3-540-69053-0_8"},{"key":"18_CR30","first-page":"520","volume":"I","author":"A. Piva","year":"1997","unstructured":"A. Piva, M. Barni, F. Bartolini, and V. Cappellini, \u201cDCT-based watermark recovering without resorting to the uncorrupted original image,\u201d Proceedings 1997 IEEE International Conference on Image Processing (1997) Vol. I, pp. 520\u2013523.","journal-title":"Proceedings 1997 IEEE International Conference on Image Processing"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"C. Podilchuck and W. Zeng, \u201cDigital image watermarking using visual models,\u201d IS&T\/SPIE Electronic Imaging 3016 (1997).","DOI":"10.1117\/12.274503"},{"key":"18_CR32","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2341-0","volume-title":"An Introduction to Signal Detection and Estimation","author":"V. Poor","year":"1994","unstructured":"V. Poor, An Introduction to Signal Detection and Estimation, 2nd Edition, Springer-Verlag, New York, 1994.","edition":"2nd Edition"},{"key":"18_CR33","unstructured":"Preliminary Proceedings of the Second International Information Hiding Workshop, 1998."},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"R. van Schyndel, A. Tirkel, and C. Osborne, \u201cA digital watermark,\u201d Proceedings 1994 IEEE International Conference on Image Processing, (1994), pp. 86\u201390.","DOI":"10.1109\/ICIP.1994.413536"},{"key":"18_CR35","unstructured":"R. van Schyndel, A. Tirkel, and C. Osborne, \u201cTowards a robust digital watermark,\u201d Proceedings DICTA-95 (1993), pp. 378\u2013385."},{"key":"18_CR36","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1364\/JOSAA.3.000771","volume":"3","author":"Y. Sheng","year":"1986","unstructured":"Y. Sheng and H.H. Arsenault, \u201cExperiments on pattern recognition using invariant Fourier-Mellon descriptors,\u201d J. Optical Society of America A 3 (1986), pp. 771\u2013776.","journal-title":"J. Optical Society of America A"},{"key":"18_CR37","first-page":"207","volume-title":"Lecture Notes in Computer Science 1174","author":"J.R. Smith","year":"1996","unstructured":"J.R. Smith and B.O. Comisky, \u201cModulation and information hiding in images,\u201d Information Hiding, First International Workshop Procedings, R. Anderson, ed., Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin (1996), pp. 207\u2013226."},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"S. Sowers and A. Youssef, \u201cTesting digital watermark resistance to destruction,\u201d Preliminary Proc. Second International Information Hiding Workshop (1998).","DOI":"10.1007\/3-540-49380-8_17"},{"key":"18_CR39","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1109\/ICIP.1996.560421","volume":"3","author":"M.D. Swanson","year":"1996","unstructured":"M.D. Swanson, B. Zhu, and A.A. Tewfik, \u201cTransparent robust image watermarking,\u201d Proc IEEE Int. Conf. On Image Processing, ICIP-96 Vol. 3, (1996) pp. 211\u2013214.","journal-title":"Proc IEEE Int. Conf. On Image Processing, ICIP-96"},{"key":"18_CR40","unstructured":"M.D. Swanson, B. Zhu, and A.H. Tewfik, \u201cRobust image watermaking using perceptual models,\u201d unpublished manuscipt (1997)."},{"key":"18_CR41","first-page":"676","volume":"II","author":"M. Swanson","year":"1997","unstructured":"M. Swanson, B. Zhu, and A. Tewfik, \u201cData Hiding for Video in Video,\u201d Proceedings 1997 IEEE International Conference on Image Processing, (1997), Vol II, pp. 676\u2013679.","journal-title":"Proceedings 1997 IEEE International Conference on Image Processing"},{"key":"18_CR42","unstructured":"A. Tirkel, G. Rankin, R. van Schyndel, W. Ho, N. Mee, and C Osborne, \u201cElectronic watermark,\u201d Proceedings DICTA-93 (1993), pp. 666\u2013673."},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"N. Wagner, \u201cFingerprinting,\u201d Proc. 1983 IEEE Symp. on Security and Privacy (1983), pp. 18\u201322.","DOI":"10.1109\/SP.1983.10018"},{"key":"18_CR44","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1109\/ICIP.1997.647972","volume":"I","author":"W. Zeng","year":"1997","unstructured":"W. Zeng and B. Liu, \u201cOn resolving rightful ownerships of digital images by invisible watermarks,\u201d Proc. IEEE Int. Conf. on Image Processing, ICIP-97 (1997), Vol. I, pp. 552\u2013555.","journal-title":"Proc. IEEE Int. Conf. on Image Processing, ICIP-97"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T03:14:58Z","timestamp":1736478898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/bfb0055486","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}