{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T22:45:23Z","timestamp":1648593923178},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,11,17]],"date-time":"2013-11-17T00:00:00Z","timestamp":1384646400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11042-013-1769-1","type":"journal-article","created":{"date-parts":[[2013,11,16]],"date-time":"2013-11-16T06:54:39Z","timestamp":1384584879000},"page":"3077-3098","source":"Crossref","is-referenced-by-count":4,"title":["Vertex angle image watermarking with optimal detector"],"prefix":"10.1007","volume":"74","author":[{"given":"Mohammad","family":"Hamghalam","sequence":"first","affiliation":[]},{"given":"Sattar","family":"Mirzakuchaki","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Ali Akhaee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,17]]},"reference":[{"key":"1769_CR1","doi-asserted-by":"crossref","unstructured":"Akhaee M, Amini A, Ghorbani G, Marvasti F (2010) A solution to gain attack onwatermarking systems: logarithmic homogeneous rational dither modulation. In: 2010 IEEE international conference on acoustics speech and signal processing (ICASSP), pp 1746\u20131749. doi: 10.1109\/ICASSP.2010.5495452","DOI":"10.1109\/ICASSP.2010.5495452"},{"key":"1769_CR2","doi-asserted-by":"crossref","unstructured":"Akhaee M, Sahraeian S, Jin C (2011) Blind image watermarking using a sample projection approach. IEEE Trans Inf Forensic Secur 6(3):883\u2013893. doi: 10.1109\/TIFS.2011.2146250","DOI":"10.1109\/TIFS.2011.2146250"},{"key":"1769_CR3","doi-asserted-by":"crossref","unstructured":"Akhaee M, Sahraeian S, Sankur B, Marvasti F (2009) Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Trans Multimedia 11(5):822\u2013833. doi: 10.1109\/TMM.2009.2012922","DOI":"10.1109\/TMM.2009.2012922"},{"key":"1769_CR4","doi-asserted-by":"crossref","unstructured":"Akhaee MA, Kalantari NK, Marvasti F (2010) Robust audio and speech watermarking using gaussian and laplacian modeling. IEEE Trans Sig Process 90(8):2487\u20132497. doi: 10.1016\/j.sigpro.2010.02.013","DOI":"10.1016\/j.sigpro.2010.02.013"},{"key":"1769_CR5","first-page":"336","volume-title":"Proceedings IWDW, vol 4675","author":"F Balado","year":"2005","unstructured":"Balado F (2005) New geometric analysis of spread-spectrum data hiding with repetition coding, with implications for side-informed schemes. In: Proceedings IWDW, vol 4675. Siena, Italy, pp 336\u2013350"},{"key":"1769_CR6","doi-asserted-by":"crossref","unstructured":"Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423\u20131443. doi: 10.1109\/18.923725","DOI":"10.1109\/18.923725"},{"key":"1769_CR7","volume-title":"Sphere-packings, lattices, and groups","author":"JH Conway","year":"1998","unstructured":"Conway JH, Sloane NJA, Bannai E (1998) Sphere-packings, lattices, and groups. Springer-Verlag, New York"},{"key":"1769_CR8","doi-asserted-by":"crossref","unstructured":"Costa M (1983) Writing on dirty paper (corresp.) IEEE Trans Inf Theory 29(3):439\u2013441. doi: 10.1109\/TIT.1983.1056659","DOI":"10.1109\/TIT.1983.1056659"},{"key":"1769_CR9","doi-asserted-by":"crossref","unstructured":"Cox I, Kilian J, Leighton F, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687. doi: 10.1109\/83.650120","DOI":"10.1109\/83.650120"},{"key":"1769_CR10","doi-asserted-by":"crossref","unstructured":"Eggers J, Buml R, Girod B (2002) Estimation of amplitude modifications before scs watermark detection. In: Proceedings SPIE: security watermarking multimedia contents IV, vol 4675, pp 387\u2013398","DOI":"10.1117\/12.465297"},{"key":"1769_CR11","doi-asserted-by":"crossref","unstructured":"Guccione P, Scagliola M (2009) Hyperbolic rdm for nonlinear valumetric distortions. IEEE Trans Inf Forensic Secur 4(1):25\u201335. doi: 10.1109\/TIFS.2008.2011080","DOI":"10.1109\/TIFS.2008.2011080"},{"key":"1769_CR12","doi-asserted-by":"crossref","unstructured":"Kalantari N, Ahadi S (2010) A logarithmic quantization index modulation for perceptually better data hiding. IEEE Trans Image Process 19(6):1504\u20131517. doi: 10.1109\/TIP.2010.2042646","DOI":"10.1109\/TIP.2010.2042646"},{"key":"1769_CR13","unstructured":"Lee K, Kim D, Kim T, Moon K (2003) Em estimation of scale factor for quantization-based audio watermarking. In: Proceedings of the 2nd international workshop digital watermarking, Seoul, pp 316\u2013327"},{"key":"1769_CR14","doi-asserted-by":"crossref","unstructured":"Li Q, Cox I (2007) Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Trans Inf Forensics Secur 2(2):127\u2013139. doi: 10.1109\/TIFS.2007.897266","DOI":"10.1109\/TIFS.2007.897266"},{"key":"1769_CR15","doi-asserted-by":"crossref","unstructured":"Marsaglia G, Tsang W, Wang J (2003) Evaluating kolmogorov\u2019s distribution. J Stat Softw 8(18):1\u20134","DOI":"10.18637\/jss.v008.i18"},{"issue":"253","key":"1769_CR16","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1080\/01621459.1951.10500769","volume":"46","author":"FJ Massey","year":"1951","unstructured":"Massey FJ (1951) The kolmogorov-smirnov test for goodness of fit. J Am Stat Assoc 46(253):68\u201378","journal-title":"J Am Stat Assoc"},{"key":"1769_CR17","doi-asserted-by":"crossref","unstructured":"Miller M, Doerr G, Cox I (2004) Applying informed coding and embedding to design a robust highcapacity watermark. IEEE Trans Image Process 13(6):792\u2013807. doi: 10.1109\/TIP.2003.821551","DOI":"10.1109\/TIP.2003.821551"},{"key":"1769_CR18","doi-asserted-by":"crossref","unstructured":"Nezhadarya E, Wang ZJ, Ward RK (2011) Robust image watermarking based on multiscale gradient direction quantization. 6(4):1200\u20131213","DOI":"10.1109\/TIFS.2011.2163627"},{"key":"1769_CR19","doi-asserted-by":"crossref","unstructured":"Oostveen JC, Kalker T, Staring M (2004) Adaptive quantization watermarking. In: Proceedings of the SPIE security watermarking multimedia contents, vol 5306. San Jose, pp 296\u2013303","DOI":"10.1117\/12.526586"},{"key":"1769_CR20","doi-asserted-by":"crossref","unstructured":"Ourique F, Licks V, Jordan R, Perez-Gonzalez F (2005) Angle qim: a novel watermark embedding scheme robust against amplitude scaling distortions. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing 2005 (ICASSP \u201905), vol 2, pp 797\u2013800. doi: 10.1109\/ICASSP.2005.1415525","DOI":"10.1109\/ICASSP.2005.1415525"},{"key":"1769_CR21","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1098\/rsta.1895.0010","volume":"186","author":"K Pearson","year":"1895","unstructured":"Pearson K (1895) Mathematical contribution to the theory of evolution. ii. skew variation in homogeneous material. Philos Trans R Soc Lond 186:343\u2013414. doi: 10.1109\/TIP.2003.819861","journal-title":"Philos Trans R Soc Lond"},{"key":"1769_CR22","doi-asserted-by":"crossref","unstructured":"Perez-Gonzalez F, Mosquera C (2008) Quantization-based data hiding robust to linear-time-invariant filtering. IEEE Trans Inf Forensic Secur 3:137\u2013152. doi: 10.1109\/TIFS.2008.922057","DOI":"10.1109\/TIFS.2008.922057"},{"key":"1769_CR23","doi-asserted-by":"crossref","unstructured":"Perez-Gonzalez F, Mosquera C, Barni M, Abrardo A (2005) Rational dither modulation: a highrate data-hiding method invariant to gain attacks. IEEE Trans Sig Process 53(10):3960\u20133975. doi: 10.1109\/TSP.2005.855407","DOI":"10.1109\/TSP.2005.855407"},{"issue":"3","key":"1769_CR24","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.compeleceng.2011.02.002","volume":"37","author":"A Phadikara","year":"2011","unstructured":"Phadikara A, Maity SP, Verma B (2011) Region based qim digital watermarking scheme for image database in dct domain. Comput Electr Eng 37(3):339\u2013355","journal-title":"Comput Electr Eng"},{"key":"1769_CR25","doi-asserted-by":"crossref","unstructured":"Shterev I, Lagendijk R (2006) Amplitude scale estimation for quantization-based watermarking. IEEE Trans Sig Process 54(11):4146\u20134155. doi: 10.1109\/TSP.2006.881216","DOI":"10.1109\/TSP.2006.881216"},{"key":"1769_CR26","doi-asserted-by":"crossref","unstructured":"Valizadeh A, Wang Z (2012) An improved multiplicative spread spectrum embedding scheme for data hiding. IEEE Trans Inf Forensic Secur 7(4):1127\u20131143. doi: 10.1109\/TIFS.2012.2199312","DOI":"10.1109\/TIFS.2012.2199312"},{"key":"1769_CR27","doi-asserted-by":"crossref","unstructured":"Wang Y, Doherty J, Van Dyck R (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11(2):77\u201388. doi: 10.1109\/83.982816","DOI":"10.1109\/83.982816"},{"key":"1769_CR28","doi-asserted-by":"crossref","unstructured":"Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612. doi: 10.1109\/TIP.2003.819861","DOI":"10.1109\/TIP.2003.819861"},{"key":"1769_CR29","doi-asserted-by":"crossref","unstructured":"Wu M, Liu B (2003) Data hiding in image and video. i. fundamental issues and solutions. IEEE Trans Image Process 12(6):685\u2013695","DOI":"10.1109\/TIP.2003.810588"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1769-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1769-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1769-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T01:49:10Z","timestamp":1564710550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1769-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,17]]},"references-count":29,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["1769"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1769-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,17]]}}}