{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T11:00:44Z","timestamp":1648638044097},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T00:00:00Z","timestamp":1477008000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"University of Science and Technology in Cracow"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Parallel Prog"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10766-016-0459-9","type":"journal-article","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T08:15:43Z","timestamp":1477037743000},"page":"1108-1127","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Implementation of Digital Watermarking Algorithms in Parallel Hardware Accelerators"],"prefix":"10.1007","volume":"45","author":[{"given":"Andrzej","family":"G\u0142owacz","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Pietro\u0144","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,21]]},"reference":[{"issue":"1","key":"459_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimedia Tools Appl. 39(1), 1\u201346 (2008)","journal-title":"Multimedia Tools Appl."},{"key":"459_CR2","unstructured":"Fridrich, J.: Methods for tamper detection in digital images. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia (1999)"},{"key":"459_CR3","unstructured":"Wen, C.-Y., Yang, K.-T.: Image authentication for digital image evidence. Forensic Sci. J. (2006)"},{"key":"459_CR4","doi-asserted-by":"crossref","unstructured":"Zhu, B., Tewfik, A.H.: Low bit rate near-transparent image coding. In: Proceedings of SPIE (1995)","DOI":"10.1117\/12.205384"},{"key":"459_CR5","unstructured":"Fawad, A., Siyal, M.Y.: A secure and robust DCT-based hashing scheme for image authentication. 10th IEEE Singapore International Conference on Communucation Systems (2006)"},{"issue":"2","key":"459_CR6","first-page":"52","volume":"3","author":"C Lin","year":"2011","unstructured":"Lin, C., Zhao, L., Yang, J.: A high performance image authentication algorithm on GPU with CUDA. Int. J. Intell. Syst. Appl. 3(2), 52\u201359 (2011)","journal-title":"Int. J. Intell. Syst. Appl."},{"key":"459_CR7","unstructured":"OpenCL\u2014Open Computing Language. www.khronos.org\/opencl (2014)"},{"key":"459_CR8","unstructured":"OpenMP\u2014Open Multi-Processing. www.openmp.org (2014)"},{"key":"459_CR9","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. International Conference on Information Technology: Coding and Computing (2000)","DOI":"10.1109\/ITCC.2000.844203"},{"key":"459_CR10","doi-asserted-by":"crossref","unstructured":"Dominguez-Conde, G., Comesa, P., Perez-Gonzalez, F.: Performance analysis of the Fridrich-Goljan self-embedding authentication method. 16th IEEE International Conference on Image Processing (2009)","DOI":"10.1109\/TIFS.2009.2026463"},{"issue":"1","key":"459_CR11","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"23","author":"N Ahmed","year":"1974","unstructured":"Ahmed, N., Natarajan, T., Rao, K.R.: Discrete cosine transform. IEEE Trans. Comput. 23(1), 90\u201393 (1974)","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"459_CR12","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/TIP.2003.810586","volume":"12","author":"A Nikolaidis","year":"2003","unstructured":"Nikolaidis, A., Pitas, I.: Asymptotically Optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. Image Process. 12(5), 563\u2013571 (2003)","journal-title":"IEEE Trans. Image Process."},{"key":"459_CR13","first-page":"309","volume":"368","author":"K Zarnowiec","year":"2013","unstructured":"Zarnowiec, K., Korus, P., Dziech, A., Glowacz, A.: Practical implementation of visual hash functions for CCTV footage authentication. Commun. Comput. Inf. Sci. 368, 309\u2013323 (2013)","journal-title":"Commun. Comput. Inf. Sci."},{"key":"459_CR14","doi-asserted-by":"crossref","unstructured":"Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE International Symposium on Information Theory (2000)","DOI":"10.1109\/ISIT.2000.866336"},{"key":"459_CR15","unstructured":"Open MPI: Open source high performance computing. www.open-mpi.org (2014)"},{"key":"459_CR16","volume-title":"Digital Watermarking and Steganography","author":"I Cox","year":"2007","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, Burlington (2007)","edition":"2"},{"key":"459_CR17","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59140-518-4","volume-title":"Digital Watermarking For Digital Media","author":"J Seitz","year":"2005","unstructured":"Seitz, J.: Digital Watermarking For Digital Media. Information Science Publishing, Charlotte (2005)"},{"key":"459_CR18","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Visual Hash for Oblivious Watermarking, Security and Watermarking of Multimedia Contents II, Vol. 3971 (2000)","DOI":"10.1117\/12.384982"},{"key":"459_CR19","doi-asserted-by":"crossref","unstructured":"Cox, I. J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. International Conference on Image Processing (1996)","DOI":"10.1109\/ICIP.1996.560429"},{"key":"459_CR20","doi-asserted-by":"crossref","unstructured":"Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE International Symposium on Information Theory (2000)","DOI":"10.1109\/ISIT.2000.866336"},{"key":"459_CR21","doi-asserted-by":"crossref","unstructured":"Flynn, M. J.: Very high-speed computing systems. In: Proceedings of the IEEE (1966)","DOI":"10.1109\/PROC.1966.5273"},{"key":"459_CR22","unstructured":"Nvidia, Nvidia CUDA C Programming Guide, version 4.2. www.nvidia.com"},{"key":"459_CR23","unstructured":"OpenCV\u2014Open Source Computer Vision. www.opencv.willowgarage.com (2014)"}],"container-title":["International Journal of Parallel Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10766-016-0459-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-016-0459-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-016-0459-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T21:57:50Z","timestamp":1568498270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10766-016-0459-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,21]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["459"],"URL":"https:\/\/doi.org\/10.1007\/s10766-016-0459-9","relation":{},"ISSN":["0885-7458","1573-7640"],"issn-type":[{"value":"0885-7458","type":"print"},{"value":"1573-7640","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,21]]}}}