{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:21:41Z","timestamp":1761675701715},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Ser. F-Inf. Sci."],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1007\/s11432-009-0125-6","type":"journal-article","created":{"date-parts":[[2009,9,12]],"date-time":"2009-09-12T07:11:46Z","timestamp":1252739506000},"page":"1605-1616","source":"Crossref","is-referenced-by-count":7,"title":["Geometrically invariant color image watermarking scheme using feature points"],"prefix":"10.1007","volume":"52","author":[{"given":"XiangYang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lan","family":"Meng","sequence":"additional","affiliation":[]},{"given":"HongYing","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,13]]},"reference":[{"key":"125_CR1","series-title":"Lect Notes Comput Sci","volume-title":"The 4th International Workshop, International Workshop on DigitalWatermarking 2005 (IWDW2005). Siena, Italy, September 15\u201317, 2005","author":"M. Barni","year":"2005","unstructured":"Barni M, Cox I J, Kalker T. Digital watermarking. In: The 4th International Workshop, International Workshop on DigitalWatermarking 2005 (IWDW2005). Siena, Italy, September 15\u201317, 2005, Lect Notes Comput Sci 3710. Berlin: Springer, 2005"},{"key":"125_CR2","volume-title":"Digital Watermarking Technique (in Chinese)","author":"S. H. Sun","year":"2004","unstructured":"Sun S H, Lu Z M, Niu X M. Digital Watermarking Technique (in Chinese). Beijing: Science Press, 2004"},{"issue":"3","key":"125_CR3","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MMUL.2005.46","volume":"1","author":"V. Licks","year":"2005","unstructured":"Licks V, Jordan R. Geometric attacks on image watermarking system. IEEE Multimedia, 2005, 1(3): 68\u201378","journal-title":"IEEE Multimedia"},{"issue":"8","key":"125_CR4","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TCSVT.2003.815955","volume":"13","author":"H. S. Kim","year":"2003","unstructured":"Kim H S, Lee H K. Invariant image watermarking using zernike moments. IEEE Trans Circuit Syst Video Tech, 2003, 13(8): 766\u2013775","journal-title":"IEEE Trans Circuit Syst Video Tech"},{"issue":"12","key":"125_CR5","doi-asserted-by":"crossref","first-page":"2140","DOI":"10.1109\/TIP.2005.857263","volume":"14","author":"P. Dong","year":"2005","unstructured":"Dong P, Jovan G B, Nikolas P G, et al. Digital watermarking robust to geometric distortions. IEEE Trans Image Process, 2005, 14(12): 2140\u20132150","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"125_CR6","first-page":"239","volume":"23","author":"P. Latha","year":"2006","unstructured":"Latha P, Anbumani K. A robust image watermarking scheme using image moment normalization. Trans Eng Comput Tech, 2006, 23(5): 239\u2013243","journal-title":"Trans Eng Comput Tech"},{"key":"125_CR7","unstructured":"Qi X J. RST-invariant digital watermarking based on template and log-polar mapping. In: Proc of the 6th IASTED International Conference on Signal and Image Processing (SIP\u201904), Honolulu, Hawaii, August 23\u201325, 2004. 42\u201346"},{"key":"125_CR8","doi-asserted-by":"crossref","unstructured":"Lichtenauer J, Setyawan I, Lagendijk R L. Hiding correlationbased watermark templates using secret modulation. In: Proc of SPIE, Security, Steganography and Watermarking of Multimedia Contents VI, vol. 5306, San Jose, USA, 2004","DOI":"10.1117\/12.526818"},{"key":"125_CR9","first-page":"320","volume":"1","author":"M. Kutter","year":"1999","unstructured":"Kutter M, Bhattacharjee S K, Ebrehimi T. Toward second generation watermarking schemes. IEEE Int Conf Image Process, 1999, 1: 320\u2013323","journal-title":"IEEE Int Conf Image Process"},{"issue":"9","key":"125_CR10","first-page":"1014","volume":"11","author":"P. Bas","year":"2002","unstructured":"Bas P, Chassery J M, Macq B. Geometrically invariant watermarking using feature points. IEEE Trans Signal Process, 2002, 11(9): 1014\u20131028","journal-title":"IEEE Trans Signal Process"},{"issue":"4","key":"125_CR11","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1109\/TSP.2003.809367","volume":"51","author":"C. W. Tang","year":"2003","unstructured":"Tang C W, Hang H M. A feature-based robust digital image watermarking scheme. IEEE Trans Signal Process, 2003, 51(4): 950\u2013958","journal-title":"IEEE Trans Signal Process"},{"key":"125_CR12","volume-title":"Towards a robust feature-based watermark","author":"J. Weinheimer","year":"2004","unstructured":"Weinheimer J. Towards a robust feature-based watermark. Dissertation for the Doctoral Degree. Rochester NY: University of Rochester, 2004"},{"key":"125_CR13","unstructured":"Li Z, Xiao W W. A rotation and scaling invariant second generation watermarking scheme. In: IEEE Region 10th Conference on Computers, Communications, Control and Power Engineering (TENCON\u201902), Beijing, China, Oct. 28\u201331, 2002. 921\u2013924"},{"issue":"4","key":"125_CR14","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TSP.2006.870581","volume":"54","author":"J. S. Seo","year":"2006","unstructured":"Seo J S, Yoo C D. Image watermarking based on invariant regions of scale-space representation. IEEE Trans Signal Process, 2006, 54(4): 1537\u20131549","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"125_CR15","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s11042-007-0112-0","volume":"34","author":"H. Y. Lee","year":"2007","unstructured":"Lee H Y, Lee C H, Lee H K. Geometrically invariant watermarking: synchronization through circular Hough transform. Multimed Tool Appl, 2007, 34(3): 337\u2013353","journal-title":"Multimed Tool Appl"},{"key":"125_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/11551492_32","volume-title":"4th International Workshop, International Workshop on Digital Watermarking 2005 (IWDW 2005), Siena, Italy, September 15\u201317, 2005","author":"H. Y. Lee","year":"2005","unstructured":"Lee H Y, Kang I K, Lee H K, et al. Evaluation of feature extraction techniques for robust watermarking. In: 4th International Workshop, International Workshop on Digital Watermarking 2005 (IWDW 2005), Siena, Italy, September 15\u201317, 2005, Lecture Notes in Computer Science 3710. Berlin: Springer, 2005. 418\u2013431"},{"issue":"1","key":"125_CR17","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1023\/B:VISI.0000027790.02288.f2","volume":"60","author":"K. Mikolajczyk","year":"2004","unstructured":"Mikolajczyk K, Schmid C. Scale & affine invariant interest point detectors. Int J Comput Vision, 2004, 60(1): 63\u201386","journal-title":"Int J Comput Vision"},{"key":"125_CR18","unstructured":"Son Y H, You B J, Oh S R, et al. Affine-Invariant Image normalization for Log-Polar Images using Momentums. In: Proceedings of the 2002 International Conference on Control, Automation, and Systems (ICCAS 2003), Gyeongju, Korea, October 22\u201325, 2003. 1140\u20131145"}],"container-title":["Science in China Series F: Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-009-0125-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-009-0125-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-009-0125-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:36:00Z","timestamp":1559403360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-009-0125-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":18,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["125"],"URL":"https:\/\/doi.org\/10.1007\/s11432-009-0125-6","relation":{},"ISSN":["1009-2757","1862-2836"],"issn-type":[{"value":"1009-2757","type":"print"},{"value":"1862-2836","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}