{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T12:41:19Z","timestamp":1651063279656},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,1,24]],"date-time":"2015-01-24T00:00:00Z","timestamp":1422057600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s12095-015-0123-z","type":"journal-article","created":{"date-parts":[[2015,1,23]],"date-time":"2015-01-23T18:46:08Z","timestamp":1422038768000},"page":"363-377","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An algebra of arrays and almost perfect watermarks"],"prefix":"10.1007","volume":"7","author":[{"given":"Nathan","family":"Jolly","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,24]]},"reference":[{"key":"123_CR1","doi-asserted-by":"crossref","unstructured":"Acevedo, S.B., Jolly, N.: Perfect Arrays of Unbounded Sizes over the Basic Quaternions. Crypt. Commun. (2013). doi: 10.1007\/s12095-013-0086-x","DOI":"10.1007\/s12095-013-0086-x"},{"issue":"4","key":"123_CR2","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1109\/18.923729","volume":"47","author":"KT Arasu","year":"2001","unstructured":"Arasu, K.T., de Launey, W.: Two-Dimensional Perfect Quaternary Arrays. IEEE Trans. Inf. Theory 47(4), 1482\u20131493 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"123_CR3","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/18.52492","volume":"36","author":"L Bomer","year":"1990","unstructured":"Bomer, L., Antweiler, M.: Two-Dimensional Perfect Binary Arrays with 64 Elements. IEEE Trans. Inf. Theory 36, 411\u2013414 (1990)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"123_CR4","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/S0019-9958(67)90755-3","volume":"11","author":"D Calabro","year":"1968","unstructured":"Calabro, D., Wolf, J.K.: On the Synthesis of Two-Dimensional Arrays with Desirable Correlation Properties. Inf. Control. 11, 537\u2013560 (1968)","journal-title":"Inf. Control."},{"issue":"2","key":"123_CR5","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/18.370141","volume":"41","author":"G Gong","year":"1995","unstructured":"Gong, G.: Theory and Applications of q-ary Interleaved Sequences. IEEE Trans. Inf. Theory 41(2), 400\u2013411 (1995)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"123_CR6","first-page":"187","volume":"61","author":"TE Hall","year":"2001","unstructured":"Hall, T.E., Osborne, C.F., Tirkel, A.Z.: Families of Matrices with Good Auto and Cross-Correlation. Ars Combinatoria 61, 187\u2013196 (2001)","journal-title":"Ars Combinatoria"},{"key":"123_CR7","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petticolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Computer Security Series, 2000, ISBN 1-58053-035-4","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"123_CR8","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1109\/7.192096","volume":"24","author":"HD Luke","year":"1988","unstructured":"Luke, H.D.: Sequences and Arrays with Perfect Periodic Correlation. IEEE Trans. Aerosp. Electron. Syst. 24, 287\u2013294 (1988)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"123_CR9","doi-asserted-by":"crossref","unstructured":"Luke, H.D., Bomer, L., Antweiler, M.: Perfect Binary Arrays, Signal Processing, Vol. 17, pp 69\u201380. Elsevier Science Publishing (1989)","DOI":"10.1016\/0165-1684(89)90073-X"},{"issue":"12","key":"123_CR10","doi-asserted-by":"crossref","first-page":"1715","DOI":"10.1109\/PROC.1976.10411","volume":"64","author":"FJ MacWilliams","year":"1976","unstructured":"MacWilliams, F.J., Sloane, N.J.: Pseudo-Random Sequences and Arrays. Proc. IEEE 64(12), 1715\u20131729 (1976)","journal-title":"Proc. IEEE"},{"issue":"8","key":"123_CR11","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/26.864158","volume":"48","author":"O Moreno","year":"2000","unstructured":"Moreno, O., Maric, S.V.: A New Family of Frequency Hop Codes. IEEE Trans. Commun. 48(8), 1241\u20131244 (2000)","journal-title":"IEEE Trans. Commun."},{"key":"123_CR12","doi-asserted-by":"crossref","unstructured":"Nussbaumer, H.J.: Fast Fourier Transform and Convolution Algorithms. Springer-Verlag (1981)","DOI":"10.1007\/978-3-662-00551-4"},{"key":"123_CR13","doi-asserted-by":"crossref","unstructured":"Scholtz, R.A., Kumar, P.V., Corrada-Bravo, C.J.: Signal Design for Ultra-Wideband Radio, Sequences and Their Applications, SETA \u201901 (2001)","DOI":"10.1007\/978-1-4471-0673-9_5"},{"key":"123_CR14","doi-asserted-by":"crossref","unstructured":"Schroeder, M.R.: Number Theory in Science and Communication, 3rd edn. Springer-Verlag (1997)","DOI":"10.1007\/978-3-662-03430-9"},{"issue":"4","key":"123_CR15","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/50.664055","volume":"16","author":"ES Shivaleela","year":"1998","unstructured":"Shivaleela, E.S., Sivarajan, K.N., Selvarajan, A.: Design of a New Family of Two-Dimensional Codes for Fiber-Optic CDMA Networks. J. Lightwave Technol. 16(4), 501\u2013508 (1998)","journal-title":"J. Lightwave Technol."},{"key":"123_CR16","doi-asserted-by":"crossref","first-page":"2137","DOI":"10.1109\/PROC.1965.4517","volume":"53","author":"R Spann","year":"1963","unstructured":"Spann, R.: A Two-Dimensional Correlation Property of Pseudo-Random Maximal-Length Sequences. Proc. IEEE 53, 2137 (1963)","journal-title":"Proc. IEEE"},{"key":"123_CR17","volume-title":"A Method for Synthesis of Perfect Two Dimensional Arrays, IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 5\u20137","author":"Z Tasheva","year":"2005","unstructured":"Tasheva, Z., Bedshev, B., Stoyanov, B.: A Method for Synthesis of Perfect Two Dimensional Arrays, IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 5\u20137. Sofia, Bulgaria (2005)"},{"key":"123_CR18","volume-title":"Steganography\u2014Applications of Coding Theory, IEEE-IT Workshop, pp. 57\u201359","author":"AZ Tirkel","year":"1997","unstructured":"Tirkel, A.Z., Osborne, C.F., Hall, T.E.: Steganography\u2014Applications of Coding Theory, IEEE-IT Workshop, pp. 57\u201359. Svalbord, Norway (1997)"},{"key":"123_CR19","volume-title":"Electronic Water Mark, DICTA 1993, pp. 666\u2013673","author":"AZ Tirkel","year":"1993","unstructured":"Tirkel, A.Z., Rankin, G.A., van Schyndel, R.M., Ho, W.J., Mee, N.R.A., Osborne, C.F.: Electronic Water Mark, DICTA 1993, pp. 666\u2013673. Maquarie University, Sydney (1993)"},{"key":"123_CR20","first-page":"336","volume-title":"A Multiplicative Color Watermark\u201d, IEEE-EURASIP Workshop on Non-Linear Signal and Imaging Processing","author":"R van Schyndel","year":"1999","unstructured":"van Schyndel, R., Tirkel, A.Z., Svalbe, I.D.: A Multiplicative Color Watermark\u201d, IEEE-EURASIP Workshop on Non-Linear Signal and Imaging Processing, pp 336\u2013340. Antalya, Turkey (1999)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0123-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0123-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0123-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T12:16:12Z","timestamp":1651061772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0123-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,24]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["123"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0123-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,24]]}}}