{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:20:36Z","timestamp":1704846036210},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T00:00:00Z","timestamp":1246406400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s12243-009-0119-9","type":"journal-article","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T02:57:17Z","timestamp":1246330637000},"page":"801-813","source":"Crossref","is-referenced-by-count":7,"title":["Comparison of secure spread-spectrum modulations applied to still image watermarking"],"prefix":"10.1007","volume":"64","author":[{"given":"Benjamin","family":"Mathon","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Bas","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois","family":"Cayre","sequence":"additional","affiliation":[]},{"given":"Beno\u00eet","family":"Macq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,1]]},"reference":[{"issue":"10","key":"119_CR1","doi-asserted-by":"crossref","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F Cayre","year":"2005","unstructured":"Cayre F, Furon T, Fontaine C (2005) Watermarking security: theory and practice. IEEE Trans Sig Proc 53(10):3976\u20133987","journal-title":"IEEE Trans Sig Proc"},{"key":"119_CR2","first-page":"5","volume":"IX","author":"A Kerckhoffs","year":"1883","unstructured":"Kerckhoffs A (1883) La cryptographie militaire. J Sci Mil IX:5\u201338","journal-title":"J Sci Mil"},{"key":"119_CR3","volume-title":"7th information hiding workshop, IH05. Lecture notes in computer science","author":"P Comesa\u00f1a","year":"2005","unstructured":"Comesa\u00f1a P, P\u00e9rez-Freire L, P\u00e9rez-Gonz\u00e1lez F (2005) Fundamentals of data hiding security and their application to spread-spectrum analysis. In: 7th information hiding workshop, IH05. Lecture notes in computer science. Springer, Barcelona"},{"issue":"1","key":"119_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2007.916006","volume":"3","author":"F Cayre","year":"2008","unstructured":"Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for woa data hiding. IEEE Trans Inf For Sec 3(1):1\u201315","journal-title":"IEEE Trans Inf For Sec"},{"issue":"12","key":"119_CR5","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Killian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"119_CR6","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"53","author":"HS Malvar","year":"2003","unstructured":"Malvar HS, Fl\u00f4rencio D (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans Signal Process 53:898\u2013905","journal-title":"IEEE Trans Signal Process"},{"key":"119_CR7","doi-asserted-by":"crossref","unstructured":"Cox IJ, Do\u00ebrr G, Furon T (2006) Watermarking is not cryptography. In: Proc. international workshop on digital watermarking (IWDW). http:\/\/www.adastral.ucl.ac.uk\/~icox\/papers\/2006\/IWDW2006.pdf","DOI":"10.1007\/11922841_1"},{"key":"119_CR8","unstructured":"Bas P, Cayre F (2006) Natural watermarking: a secure spread spectrum technique for woa. In: Proc. information hiding, Alexandria"},{"key":"119_CR9","doi-asserted-by":"crossref","unstructured":"Bas P, Cayre F (2006) Achieving subspace or key security for woa using natural or circular watermarking. In: Proc. ACM multimedia security workshop, Geneva","DOI":"10.1145\/1161366.1161381"},{"key":"119_CR10","doi-asserted-by":"crossref","unstructured":"Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. In: IEEE signal processing society 1997 international conference on image processing (ICIP\u201997), Santa Barbara","DOI":"10.1109\/ICIP.1997.647964"},{"key":"119_CR11","doi-asserted-by":"crossref","unstructured":"Furon T, Bas P (2008) Broken arrows. EURASIP J Inf Secur 2008(ID 597040)","DOI":"10.1155\/2008\/597040"},{"key":"119_CR12","unstructured":"Bas P, Furon T (2008) Break our watermarking system, 2nd edn. http:\/\/bows2.gipsa-lab.inpg.fr"},{"key":"119_CR13","doi-asserted-by":"crossref","DOI":"10.1002\/0471221317","volume-title":"Independent component analysis","author":"A Hyv\u00e4rinen","year":"2001","unstructured":"Hyv\u00e4rinen A, Karhunen J, Oja E (2001) Independent component analysis. Wiley, New York"},{"key":"119_CR14","series-title":"Lecture notes on computer science","first-page":"171","volume-title":"Proc. international workshop on digital watermarking (IWDW)","author":"F Cayre","year":"2004","unstructured":"Cayre F, Fontaine C, Furon T (2004) Watermarking attack: security of wss techniques. In: Proc. international workshop on digital watermarking (IWDW). Lecture notes on computer science (3304). Springer, New York, pp 171\u2013183"},{"issue":"3","key":"119_CR15","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1109\/72.761722","volume":"10","author":"A Hyvarinen","year":"1999","unstructured":"Hyvarinen A (1999) Fast and robust fixed-point algorithm for independent component analysis. IEEE Trans Neur Net 10(3):626\u2013634","journal-title":"IEEE Trans Neur Net"},{"key":"119_CR16","doi-asserted-by":"crossref","unstructured":"Bas P, Do\u00ebrr G (2007) Practical security analysis of dirty paper trellis watermarking. In: Proc. information hiding, St-Malo","DOI":"10.1007\/978-3-540-77370-2_12"},{"key":"119_CR17","doi-asserted-by":"crossref","unstructured":"Mathon B, Bas P, Cayre F, P\u00e9rez-Gonz\u00e1lez F (2008) Distortion optimization of model-based secure embedding schemes for data-hiding. In: Proc. information hiding, Santa-Barbara","DOI":"10.1007\/978-3-540-88961-8_23"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0119-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-009-0119-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0119-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T06:38:01Z","timestamp":1559457481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-009-0119-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,1]]},"references-count":17,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["119"],"URL":"https:\/\/doi.org\/10.1007\/s12243-009-0119-9","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,1]]}}}