{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T09:50:15Z","timestamp":1649325015724},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,1,28]],"date-time":"2018-01-28T00:00:00Z","timestamp":1517097600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11623-018-0896-2","type":"journal-article","created":{"date-parts":[[2018,1,27]],"date-time":"2018-01-27T10:06:14Z","timestamp":1517047574000},"page":"69-73","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Digitale Wasserzeichen in der Kriminalistik"],"prefix":"10.1007","volume":"42","author":[{"given":"Michael","family":"Waschetzki","sequence":"first","affiliation":[]},{"given":"Martin","family":"Steinebach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,28]]},"reference":[{"key":"896_CR1","volume-title":"Computer-Forensik","author":"A Geschonneck","year":"2014","unstructured":"Geschonneck, A.: Computer-Forensik (iX Edition): Computerstraftaten erkennen, ermitteln, aufkl\u00e4ren, 6. Auflage, Heidelberg: dpunkt.verlag, 2014, Kindle E-Book"},{"key":"896_CR2","volume-title":"Forensische Informatik","author":"A\/ Dewald","year":"2015","unstructured":"Dewald, A.\/ Freiling, F. C. (Hrsg.): Forensische Informatik, 2. Auflage, Norderstedt: BoD, 2015"},{"key":"896_CR3","unstructured":"Steinebach, Wolf, Engelhard: Datenschutzrechtliche Betrachtung digitaler Wasserzeichen, In: Proceeding of D-A-CH Security, syssex, September 2010."},{"key":"896_CR4","unstructured":"Marcel Sch\u00e4fer, Waldemar Berchtold, Margareta Heilmann, Sascha Zmudzinski, Martin Steinebach, Stefan Katzenbeisser: Collusion Secure Fingerprint Watermarking for Real World Applications, In: Proc. of GI-Sicherheit 2010, October 2010"},{"key":"896_CR5","unstructured":"Adams, M.: Why the OPM Hack Is Far Worse Than You Imagine, https:\/\/www. lawfareblog.om\/why-opm-hack-far-worse-you-imagine"},{"key":"896_CR6","unstructured":"Beuth, P.: Landesverrat: Eine Warnung an alle, http:\/\/www.zeit.de\/digital\/ internet\/2015-07\/landesverrat-netzpolitik-anzeige-verfassungsschutzgeneralbundesanwalt- abschreckung."},{"key":"896_CR7","unstructured":"Dohmen, F.: Massive neue Vorw\u00fcrfe belasten Telekom, http:\/\/www. spiegel.de\/wirtschaft\/spitzelaffaere-massive-neue-vorwuerfe-belastentelekom- a-556453.html"},{"key":"896_CR8","unstructured":"Politiker attackieren BND wegen illegaler Journalisten-Beschattung, http:\/\/ www.spiegel.de\/politik\/deutschland\/ueberwachungs-skandal-politikerattackieren- bnd-wegenillegaler-journalisten-beschattung-a-384312. html"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0896-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0896-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0896-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T15:23:46Z","timestamp":1552058626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0896-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,28]]},"references-count":8,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["896"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0896-2","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,28]]},"assertion":[{"value":"28 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}