{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T23:10:24Z","timestamp":1737155424814,"version":"3.33.0"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,6,1]],"date-time":"2007-06-01T00:00:00Z","timestamp":1180656000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SCI CHINA SER F"],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1007\/s11432-007-0024-7","type":"journal-article","created":{"date-parts":[[2007,6,27]],"date-time":"2007-06-27T16:56:59Z","timestamp":1182963419000},"page":"491-509","source":"Crossref","is-referenced-by-count":9,"title":["A digital authentication watermarking scheme for JPEG images with superior localization and security"],"prefix":"10.1007","volume":"50","author":[{"given":"Miao","family":"Yu","sequence":"first","affiliation":[]},{"given":"HongJie","family":"He","sequence":"additional","affiliation":[]},{"given":"JiaShu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1117\/12.274502","volume-title":"Human Vision and Electronic Imaging II","author":"I. J. Cox","year":"1997","unstructured":"Cox I J, Miller M L. Review of watermarking and the importance of perceptual modeling. In: Bernice E R, Thrasyvoulos N P, eds. Human Vision and Electronic Imaging II, Vol. 3016. Bellingham: SPIE Press, 1997. 92\u201399"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Liu R Z, Tan T N. Watermarking for digital images. In: Proceedings of ICSP\u201998, Beijing, China, February. 1998. 944\u2013947","DOI":"10.1109\/ICOSP.1998.770768"},{"issue":"10","key":"24_CR3","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1360\/jos161798","volume":"16","author":"Z. W. Sun","year":"2005","unstructured":"Sun Z W, Feng D G. A multiplicative watermark detection algorithm for digital images in the DCT Domains. J Softw, 2005, 16(10): 1798\u20131804","journal-title":"J Softw"},{"issue":"2","key":"24_CR4","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1360\/jos160295","volume":"16","author":"C. Jin","year":"2005","unstructured":"Jin C, Peng J X. A robust detection method of blind digital watermark based on image projective sequence. J Softw, 2005, 16(2): 295\u2013302","journal-title":"J Softw"},{"key":"24_CR5","first-page":"7","volume":"2","author":"C. K. Ho","year":"2004","unstructured":"Ho C K, Li C T. Semi-fragile watermarking scheme for authentication of JPEG images. In: Proceedings of ITCC\u20192004, 2004, 2: 7\u201311","journal-title":"Proceedings of ITCC\u20192004"},{"issue":"2","key":"24_CR6","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"C. Y. Lin","year":"2001","unstructured":"Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circ Syst Video Tech, 2001, 11(2): 153\u2013168","journal-title":"IEEE Trans Circ Syst Video Tech"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Li C-T. Digital fragile watermarking scheme for authentication of JPEG images. IEE Proceedings-Vision, Image, and Signal Processing, December, 2004, 460\u2013466","DOI":"10.1049\/ip-vis:20040812"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R. Invertible authentication watermark for JPEG images. In: Proceedings of ITCC\u20192001, Las Vegas, NV, USA, April, 2001. 446\u2013449","DOI":"10.1109\/ICIP.2000.900991"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Matthew H, Nasir M. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. on Image Processing, March, 2000. 432\u2013441","DOI":"10.1109\/83.826780"}],"container-title":["Science in China Series F: Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-007-0024-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-007-0024-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-007-0024-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T22:35:50Z","timestamp":1737153350000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-007-0024-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":9,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,6]]}},"alternative-id":["24"],"URL":"https:\/\/doi.org\/10.1007\/s11432-007-0024-7","relation":{},"ISSN":["1009-2757","1862-2836"],"issn-type":[{"type":"print","value":"1009-2757"},{"type":"electronic","value":"1862-2836"}],"subject":[],"published":{"date-parts":[[2007,6]]}}}