{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:11Z","timestamp":1740148931046,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T00:00:00Z","timestamp":1627862400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T00:00:00Z","timestamp":1627862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12095-021-00517-8","type":"journal-article","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T21:03:36Z","timestamp":1627938216000},"page":"307-318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-party watermark embedding with frequency-hopping sequences"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7466-0907","authenticated-orcid":false,"given":"Limengnan","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Hanzhou","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,2]]},"reference":[{"key":"517_CR1","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FAP Petitcolas","year":"1999","unstructured":"Petitcolas, F. A. P., Anderson, R. J., Kuhn, M. G.: Information hiding - a survey. Proc. IEEE 87, 1062\u20131078 (1999)","journal-title":"Proc. IEEE"},{"key":"517_CR2","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography, 2nd edn. Morgan Kaufmann (2007)","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"517_CR3","doi-asserted-by":"crossref","unstructured":"Eppstein, D., Goodrich, M. T., Lam, J., Mamano, N., Mitzenmacher, M., Torr, M.: Models and algorithms for graph watermarking. Int. Conf. Inf. Secu., 283\u2013301 (2016)","DOI":"10.1007\/978-3-319-45871-7_18"},{"key":"517_CR4","doi-asserted-by":"crossref","unstructured":"Sheppard, N. P., Safavi-Naini, R., Ogunbona, P.: On multiple watermarking. Proc. ACM Workshop on Multimedia and Security: New Challenges, pp. 3\u20136 (2001)","DOI":"10.1145\/1232454.1232458"},{"key":"517_CR5","doi-asserted-by":"crossref","unstructured":"Mintzer, F., Braudaway, G. W.: If one watermark is good, are more better? Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Process., pp. 2067\u20132069 (1999)","DOI":"10.1109\/ICASSP.1999.758338"},{"key":"517_CR6","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, H., Shi, Y.: PPE-Based reversible data hiding. Proc. ACM Workshop Inf. Hiding Multimed. Security, pp. 187\u2013188 (2016)","DOI":"10.1145\/2909827.2933196"},{"key":"517_CR7","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, H., Shi, Y.: Dynamic content selection-and-prediction framework applied to reversible data hiding. Proc. IEEE Workshop Inf. Forensics Security, pp. 1\u20136 (2016)","DOI":"10.1109\/WIFS.2016.7823903"},{"key":"517_CR8","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1109\/TCSVT.2016.2556585","volume":"27","author":"H Wu","year":"2017","unstructured":"Wu, H., Shi, Y., Wang, H., Zhou, L.: Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Trans. Circ. Syst. Video Technol. 27, 1620\u20131631 (2017)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"517_CR9","unstructured":"Li, X., Sun, J., Yang, X., Liu, W.: Multiple watermarking algorithm based on spread transform dither modulation. arXiv:1601.04522 (2016)"},{"key":"517_CR10","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1109\/83.913599","volume":"10","author":"S Stankovic","year":"2001","unstructured":"Stankovic, S., Djurovic, I., Pitas, I.: Watermarking in the space\/spatial-frequency domain using two-dimensional Radon-Wigner distribution. IEEE Trans. Image Process. 10, 650\u2013658 (2001)","journal-title":"IEEE Trans. Image Process."},{"key":"517_CR11","doi-asserted-by":"crossref","unstructured":"Peng, D., Wang, J., Yang, S., Wang, S., Liu, A.: CDMA Based multiple-user digital watermarking. Proc. Int. Conf. Intell. Inf. Hiding Multimed. Signal Process., 75\u201378 (2006)","DOI":"10.1109\/IIH-MSP.2006.264958"},{"key":"517_CR12","doi-asserted-by":"crossref","unstructured":"Xiao, J., Wang, Y.: Multiple watermarking with side information. Proc. Int. Workshop Digital Watermarking, pp. 379\u2013387 (2008)","DOI":"10.1007\/978-3-642-04438-0_32"},{"key":"517_CR13","doi-asserted-by":"crossref","unstructured":"Scealy, R., Safavi-Naini, R., Sheppard, N. P.: Performance measurement of watermark embedding patterns. Proc. Int. Workshop Digital Watermarking, pp. 77\u201385 (2003)","DOI":"10.1007\/978-3-540-24624-4_6"},{"key":"517_CR14","volume-title":"Sequence Design for Communications Applications. Research Studies Press (RSP)","author":"P Fan","year":"1996","unstructured":"Fan, P., Darnell, M.: Sequence Design for Communications Applications. Research Studies Press (RSP). Wiley, London (1996)"},{"key":"517_CR15","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1109\/TIT.2004.833362","volume":"50","author":"D Peng","year":"2004","unstructured":"Peng, D., Fan, P.: Lower bounds on the hamming auto- and cross correlations of frequency-hopping sequences. IEEE Trans. Inf. Theory 50, 2149\u20132154 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"517_CR16","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/TIT.1974.1055169","volume":"20","author":"A Lempel","year":"1974","unstructured":"Lempel, A., Greenberger, H.: Families of sequences with optimal hamming correlation properties. IEEE Trans. Inf. Theory 20, 90\u201394 (1974)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"517_CR17","doi-asserted-by":"crossref","unstructured":"Niu, X., Peng, D., Liu, F., Liu, X.: Lower bounds on the maximum partial correlations of frequency hopping sequence set with low hit zone. IEICE Trans. Fund. E93-A, 2227\u20132231 (2010)","DOI":"10.1587\/transfun.E93.A.2227"},{"key":"517_CR18","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s11432-006-0208-6","volume":"49","author":"D Peng","year":"2006","unstructured":"Peng, D., Fan, P., Lee, M.: Lower bounds on the periodic hamming correlations of frequency hopping sequences with low hit zone. Sci. China F. Inf. Sci. 49, 208\u2013218 (2006)","journal-title":"Sci. China F. Inf. Sci."},{"key":"517_CR19","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3934\/amc.2018004","volume":"12","author":"L Zhou","year":"2018","unstructured":"Zhou, L., Peng, D., Han, H., Liang, H., Ma, Z.: Construction of optimal low-hit-zone frequency hopping sequence sets under periodic partial hamming correlation. Adv. Math. Commun. 12, 67\u201379 (2018)","journal-title":"Adv. Math. Commun."},{"key":"517_CR20","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1109\/LCOMM.2018.2810868","volume":"22","author":"X Liu","year":"2018","unstructured":"Liu, X., Zhou, L.: New bound on partial hamming correlation of low-hit-zone frequency hopping sequences and optimal constructions. IEEE Commun. Lett. 22, 878\u2013881 (2018)","journal-title":"IEEE Commun. Lett."},{"key":"517_CR21","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"5","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB Matching revisited. IEEE Signal Process. Lett. 5, 285\u2013287 (2006)","journal-title":"IEEE Signal Process. Lett."},{"key":"517_CR22","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5-A Steganographic algorithm. Proc. Inf. Hiding, 289\u2013302 (2001)","DOI":"10.1007\/3-540-45496-9_21"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00517-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00517-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00517-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T07:15:28Z","timestamp":1646291728000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00517-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,2]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["517"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00517-8","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,8,2]]},"assertion":[{"value":"29 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}