{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:16:52Z","timestamp":1760955412124},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,3]],"date-time":"2013-05-03T00:00:00Z","timestamp":1367539200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s11042-013-1435-7","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T12:00:44Z","timestamp":1367496044000},"page":"1077-1102","source":"Crossref","is-referenced-by-count":11,"title":["Stereo image watermarking scheme for authentication with self-recovery capability using inter-view reference sharing"],"prefix":"10.1007","volume":"73","author":[{"given":"Ting","family":"Luo","sequence":"first","affiliation":[]},{"given":"Gangyi","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Zongju","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,3]]},"reference":[{"key":"1435_CR1","doi-asserted-by":"crossref","unstructured":"Campisi P (2008) Object-oriented stereo-image digital watermarking. In: Journal of electronic imaging, vol. 17, SPIE, 043024","DOI":"10.1117\/1.3009554"},{"key":"1435_CR2","doi-asserted-by":"crossref","unstructured":"Celik M, Sharma G, Saber E, Tekalp A (2002) Hierarchical watermarking for secure image authentication with localization. In: IEEE transaction on image processing, vol. 11, IEEE, pp. 585\u2013595","DOI":"10.1109\/TIP.2002.1014990"},{"key":"1435_CR3","unstructured":"Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. In: Journal of electronic imaging, vol. 11, SPIE, pp. 262\u2013274"},{"key":"1435_CR4","doi-asserted-by":"crossref","unstructured":"Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. In: Multimedia tools and applications, vol. 39, Springer, pp. 1\u201346","DOI":"10.1007\/s11042-007-0154-3"},{"key":"1435_CR5","doi-asserted-by":"crossref","unstructured":"He H, Zhang J, Tai H (2011) A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization. In: Multimedia tools and applications, vol. 52, Springer, pp 307\u2013324","DOI":"10.1007\/s11042-010-0474-6"},{"key":"1435_CR6","doi-asserted-by":"crossref","unstructured":"Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. In: Optics communications, vol. 285, Elsevier, pp. 1759\u20131766","DOI":"10.1016\/j.optcom.2011.12.044"},{"key":"1435_CR7","doi-asserted-by":"crossref","unstructured":"Hur N, Lee H, Lee G, Lee S, Gotchev A, Park S (2011) 3DTV broadcasting and distribution systems. In: IEEE transaction on broadcasting, vol. 57, IEEE, pp. 395\u2013407","DOI":"10.1109\/TBC.2011.2114710"},{"key":"1435_CR8","doi-asserted-by":"crossref","unstructured":"Hwang D, Bae K, Lee M, Kim S (2003) Real-time stereo image watermarking using discrete cosine transform and adaptive disparity maps. In: Proceedings of SPIE 5241, SPIE, pp. 233\u2013242","DOI":"10.1117\/12.511615"},{"key":"1435_CR9","doi-asserted-by":"crossref","unstructured":"Hwang D, Base K, Kim E (2004) Stereo image watermarking scheme based on discrete wavelet transform and adaptive disparity estimation. In: Proceedings of SPIE 5208, SPIE, pp. 196\u2013205","DOI":"10.1117\/12.506616"},{"key":"1435_CR10","doi-asserted-by":"crossref","unstructured":"Lee T, Lin S (2008) Dual watermark for image tamper detection and recovery. In: Pattern recognition, vol. 41, Elsevier, pp. 3497\u20133506","DOI":"10.1016\/j.patcog.2008.05.003"},{"key":"1435_CR11","doi-asserted-by":"crossref","unstructured":"Li C, Wang Y, Ma B, Zhang Z (2011) A novel self-recovery fragile watermarking scheme based on dual\u2013redundant-ring structure. In: Computer & electrical engineering, vol. 37, Elsevier, pp. 927\u2013940","DOI":"10.1016\/j.compeleceng.2011.09.007"},{"key":"1435_CR12","doi-asserted-by":"crossref","unstructured":"Lin P, Hsieh C, Huang P (2005) A hierarchical digital watermarking method for image tamper and recovery. In: Pattern recognition, vol. 38, Elsevier, pp. 2519\u20132529","DOI":"10.1016\/j.patcog.2005.02.007"},{"key":"1435_CR13","doi-asserted-by":"crossref","unstructured":"Lin Y, Wu J (2011) A novel blind watermarking scheme for depth-image-based rendering 3D images. In: IEEE Transaction on Broadcasting, vol. 57, IEEE, pp. 602\u2013611","DOI":"10.1109\/TBC.2011.2131470"},{"key":"1435_CR14","unstructured":"Liu H, Yao X, Huang J (2010) Semi-fragile Zernike moment-base image watermarking for authentication. In: EURASIP Journal on advances in signal processing, vol. 7, Springer, pp. 1\u201317"},{"key":"1435_CR15","doi-asserted-by":"crossref","unstructured":"Niu Y, Souidene W, Beghdadi A (2011) A visual sensitivity model based stereo image watermarking scheme. In: Third European workshop on visual information processing, IEEE, pp. 211\u2013215","DOI":"10.1109\/EuVIP.2011.6045546"},{"key":"1435_CR16","doi-asserted-by":"crossref","unstructured":"Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. In: Journal of visual communication and image representation, vol. 22, Elsevier, pp. 187\u2013200","DOI":"10.1016\/j.jvcir.2010.12.005"},{"key":"1435_CR17","doi-asserted-by":"crossref","unstructured":"Sabater N, Almansa A, Morel J (2012) Meaningful matches in stereovision. In: IEEE transaction on pattern analysis and machine intelligence, vol. 34, IEEE, pp. 930\u2013942","DOI":"10.1109\/TPAMI.2011.207"},{"key":"1435_CR18","doi-asserted-by":"crossref","unstructured":"Shao F, Jiang G, Yu M, Chen K, Ho Y-S (2012) Asymmetric coding of multi-view video plus depth based 3-D video for view rendering. In: IEEE Transactions on Multimedia, vol. 14, IEEE, pp. 157\u2013167","DOI":"10.1109\/TMM.2011.2169045"},{"key":"1435_CR19","doi-asserted-by":"crossref","unstructured":"Tanimoto M, Tehrani M, Fujii T, Yendo T (2012) FTV for 3-D spatial communication. In: Proceedings of the IEEE, vol. 100, IEEE, pp. 905\u2013917","DOI":"10.1109\/JPROC.2011.2182101"},{"key":"1435_CR20","doi-asserted-by":"crossref","unstructured":"Vleeschouwer C, Delaigle J, Macq B (2002) Invisibility and application functionalities in perceptual watermarking an overview. In: Proceedings of IEEE, vol. 90, IEEE, pp. 64\u201377","DOI":"10.1109\/5.982406"},{"key":"1435_CR21","doi-asserted-by":"crossref","unstructured":"Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. In: Signal processing, vol. 89, Elsevier, pp. 675\u2013679","DOI":"10.1016\/j.sigpro.2008.10.001"},{"key":"1435_CR22","doi-asserted-by":"crossref","unstructured":"Zhou Y, Jiang G, Yu M, Peng Z, Shao F (2012) Region-based error concealment of right-view frames for stereoscopic video transmission. In: Computers and electrical engineering, vol. 38, Elsevier, pp. 217\u2013230","DOI":"10.1016\/j.compeleceng.2011.12.011"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1435-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1435-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1435-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T08:50:33Z","timestamp":1563007833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1435-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,3]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["1435"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1435-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,3]]}}}