{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,7]],"date-time":"2023-05-07T06:10:04Z","timestamp":1683439804224},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,4,26]],"date-time":"2006-04-26T00:00:00Z","timestamp":1146009600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2006,5]]},"DOI":"10.1007\/s10044-006-0026-x","type":"journal-article","created":{"date-parts":[[2006,4,25]],"date-time":"2006-04-25T06:54:29Z","timestamp":1145948069000},"page":"70-82","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of position based watermarking"],"prefix":"10.1007","volume":"9","author":[{"given":"Paulo Vinicius Koerich","family":"Borges","sequence":"first","affiliation":[]},{"given":"Joceli","family":"Mayer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,4,26]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1016\/S0165-1684(01)00043-3","volume":"81","author":"R Baitello","year":"2001","unstructured":"Baitello R, Barni M, Bartolini F, Cappellini V (2001) From watermark detection to watermark decoding: a PPM approach. Signal Processing 81:1261\u20131271","journal-title":"Signal Processing"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Barni M, Bartolini F (2004) Watermarking systems engineering: enabling digital assets security and other applications. Dekker, New York","DOI":"10.1201\/9780203913512"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Barni M, Bartonlini F, Cappellini V, Piva A (1998) Copyright protection of digital images by embedded unperceivable marks. Image Vis Comput 16(12\/13)","DOI":"10.1016\/S0262-8856(98)00058-4"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE transactions on image processing 10, May 2001","DOI":"10.1109\/83.918570"},{"key":"26_CR5","unstructured":"Borges PV (2004) Positional model for digital watermarks. Master Thesis in Electrical Engineering, Federal University of Santa Catarina, Brazil"},{"key":"26_CR6","unstructured":"Borges PVK, Mayer J (2003) Position based watermarking. Proceedings of the 3rd international symposium on image and signal processing and analysis\u2013ISPA"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Borges PV, Mayer J (2004) Informed position based watermarking. IEEE proceedings of the 17th brazilian symposium on computer graphics and image processing","DOI":"10.1109\/SIBGRA.2004.1352941"},{"key":"26_CR8","unstructured":"Borges PV, Mayer J (2005) Informed position embedding for multi-bit watermarking. IEEE international conference on acoustics, speech and signal processing"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory, 47","DOI":"10.1109\/18.923725"},{"key":"26_CR10","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M Costa","year":"1983","unstructured":"Costa M (1983) Writing on dirty paper. IEEE Trans Inf Theory 29:439\u2013441","journal-title":"IEEE Trans Inf Theory"},{"issue":"7","key":"26_CR11","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1109\/5.771068","volume":"87","author":"IJ Cox","year":"1999","unstructured":"Cox IJ, Miller ML, McKellips A (1999) Watermarking as communications with side information. Proc IEEE 87(7):1127\u20131141","journal-title":"Proc IEEE"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking, Morgan Kaufmann","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Fei C, Kundur D, Kwong RH (2004) Analysis and design of watermarking algorithms for improved resistance to compression. IEEE transactions on image processing 13","DOI":"10.1109\/TIP.2004.823830"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Kutter M, Winkler S (2002) A vision-based masking model for spread-spectrum image watermarking. IEEE transactions on image processing 11","DOI":"10.1109\/83.977879"},{"issue":"5","key":"26_CR15","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"GC Langelaar","year":"2000","unstructured":"Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. IEEE Signal Process Mag 17(5):20\u201346","journal-title":"IEEE Signal Process Mag"},{"key":"26_CR16","unstructured":"Maes M, Kalker T, Haitsma J, Depovere G (1999) Exploiting shift invariance to obtain a high payload in digital image watermarking. IEEE international conference on multimedia computing and systems"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Malvar HS, Florencio D (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE transactions on signal processing 51(4)","DOI":"10.1109\/TSP.2003.809385"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Mayer J, Bermudez JCM (2005) Multi-bit informed embedding watermarking with constant robustness. IEEE international conference on image processing","DOI":"10.1109\/ICIP.2005.1529839"},{"key":"26_CR19","unstructured":"Mayer J, Silva RA (2004) Efficient informed embedding of multi-bit watermarking. IEEE international conference on acoustics, speech and signal processing"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Mayer J, Silverio AV, Bermudez JCM (2002) On the design of pattern sequences for spread spectrum image watermarking. International telecommunications symposium (ITS2002)","DOI":"10.14209\/its.2002.292"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Miller ML (2001) Watermarking with dirty-paper codes. IEEE Proceedings of the 2001 international conference on image processing","DOI":"10.1109\/ICIP.2001.958547"},{"key":"26_CR22","unstructured":"Miller ML, Dorr GJ, Cox IJ (2002) Dirty-paper trellis codes for watermarking. IEEE international conference on image processing"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Miller ML, Doerr GJ, Cox IJ (2004) Applying informed coding and embedding to design a robust high-capacity watermark. IEEE transactions on image processing 13, June 2004","DOI":"10.1109\/TIP.2003.821551"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Nikolaidis A, Pitas I (2001) Region-based image watermarking. IEEE transactions on image processing 10","DOI":"10.1109\/83.967400"},{"key":"26_CR25","unstructured":"Sklar B (2001) Digital communications. Prentice-Hall, New York"},{"key":"26_CR26","unstructured":"Tang C-W, Hang H-M (2003) A feature-based robust digital image watermarking scheme. IEEE transactions on signal processing 51"},{"key":"26_CR27","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1117\/12.152694","volume":"1913","author":"AB Watson","year":"1993","unstructured":"Watson AB (1993) DCT quantization matrices optimized for individual images. Hum Vis Vis Process Dig Disp IV, SPIE 1913:202\u2013216","journal-title":"Hum Vis Vis Process Digit Disp IV, SPIE"},{"key":"26_CR28","unstructured":"Winston WL, (1995) Introduction to mathematical programming: applications and algorithms, Duxbury Press"},{"issue":"2","key":"26_CR29","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MSP.2004.1276103","volume":"21","author":"M Wu","year":"2004","unstructured":"Wu M, Trappe W, Wang Z, Ray Liu KJ (2004) Collusion-resistant fingerprinting for multimedia. IEEE Signal Process Mag 21(2):15\u201327","journal-title":"IEEE Signal Process Mag"},{"key":"26_CR30","unstructured":"Yen EK, Johnston RG (1996) The ineffectiveness of the correlation coefficient for image comparisons. Report LAUR-96-2474, Los Alamos National Laboratory"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0026-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-006-0026-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0026-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,7]],"date-time":"2023-05-07T05:35:28Z","timestamp":1683437728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-006-0026-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4,26]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,5]]}},"alternative-id":["26"],"URL":"https:\/\/doi.org\/10.1007\/s10044-006-0026-x","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,4,26]]}}}