{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:11:48Z","timestamp":1743264708548},"reference-count":19,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1998,8,1]],"date-time":"1998-08-01T00:00:00Z","timestamp":901929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Graphics"],"published-print":{"date-parts":[[1998,8]]},"DOI":"10.1016\/s0097-8493(98)00030-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T12:08:45Z","timestamp":1027598925000},"page":"405-416","source":"Crossref","is-referenced-by-count":49,"title":["Digital image watermarking using mixing systems"],"prefix":"10.1016","volume":"22","author":[{"given":"G.","family":"Voyatzis","sequence":"first","affiliation":[]},{"given":"I.","family":"Pitas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0097-8493(98)00030-2_BIB1","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"25","author":"Bender","year":"1996","journal-title":"IBM Systems Journal"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB2","first-page":"460","article-title":"Applying signatures on digital images","volume":"1","author":"Pitas","year":"1995","journal-title":"Proceedings IEEE Workshop on Nonlinear Signal and Image processing"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB3","first-page":"711","article-title":"Digital images protection techniques in a broadcast framework: an overview","volume":"2","author":"Delaigle","year":"1996","journal-title":"Proceedings of ECMAST'96"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB4","unstructured":"Matsui, K. and Tanaka, K., Video-Steganography: how to secretly embed a signature in a picture. IMA Intellectual Property Project Proceedings, Vol. 1, no. 1, 1994"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB5","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/ICIP.1994.413536","article-title":"A digital watermark","volume":"2","author":"van Schyndel","year":"1994","journal-title":"Proceedings of ICIP'94"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB6","first-page":"452","article-title":"Towards robust and hidden image copyright labeling","volume":"1","author":"Koch","year":"1995","journal-title":"Proceedings IEEE workshop on Nonlinear Signal and Image processing"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB7","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/ICIP.1996.560424","article-title":"Hidden signatures in images","volume":"3","author":"Hsu","year":"1996","journal-title":"Proceedings of ICIP'96"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB8","unstructured":"Cox, I. J., Kilian, J., Leighton, T. and Shammoon, T., Secure spread spectrum watermarking for multimedia, Tech. Report, NEC research Institute, no. 95\u201310 (1995)"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB9","doi-asserted-by":"crossref","unstructured":"Craver, S., Memon, N., Yeo, B. L. and Yeung, M. M., Can invisible watermarks resolve rightful ownerships? IBM Technical Report, RC 20509 (1996)","DOI":"10.1117\/12.263419"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB10","doi-asserted-by":"crossref","unstructured":"Nikolaidis, N. and Pitas, I., Robust image watermarking in the spatial domain, to appear in Signal Proc. sp. Issue on Copyright Protection and Access control (1998)","DOI":"10.1016\/S0165-1684(98)00017-6"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB11","first-page":"1701","article-title":"Embedding parametric digital signatures in images","volume":"3","author":"Bors","year":"1996","journal-title":"Proceedings of EUSIPCO'96"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB12","unstructured":"Arrowsmith, D. K. and Place, C. M., An introduction to dynamical systems, Cambridge Univ. Press, 1990"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB13","doi-asserted-by":"crossref","unstructured":"Percival, I. and Vivaldi, F., Arithmetical properties of strongly chaotic systems. Physica 25D, 1987, 105\u2013130","DOI":"10.1016\/0167-2789(87)90096-0"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB14","first-page":"687","article-title":"Chaotic mixing of digital images and applications to watermarking","volume":"2","author":"Voyatzis","year":"1996","journal-title":"Proceedings of ECMAST'96"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB15","doi-asserted-by":"crossref","unstructured":"Swanson, M. D., Zhu, B., Tewfik A. H. and Boney, L., Robust audio watermarking using perceptual masking, to appear in Signal Proc. sp. issue on Copyright Protection and Access control (1998)","DOI":"10.1016\/S0165-1684(98)00014-0"},{"issue":"10","key":"10.1016\/S0097-8493(98)00030-2_BIB16","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1109\/5.241504","article-title":"Signal compression based on models of human perception","volume":"81","author":"Jayant","year":"1993","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB17","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1109\/ICIP.1996.560753","article-title":"Applications of Toral automorphisms in image watermarking","volume":"2","author":"Voyatzis","year":"1996","journal-title":"Proceedings of ICIP'96"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB18","first-page":"213","article-title":"Embedding robust logo watermarks in digital images","volume":"1","author":"Voyatzis","year":"1997","journal-title":"Proceedings of DSP'97"},{"key":"10.1016\/S0097-8493(98)00030-2_BIB19","unstructured":"Papoulis, A., Probability and Statistics. Prentice Hall, New Jersey, 1991"}],"container-title":["Computers &amp; Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0097849398000302?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0097849398000302?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T09:39:30Z","timestamp":1578476370000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0097849398000302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,8]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,8]]}},"alternative-id":["S0097849398000302"],"URL":"https:\/\/doi.org\/10.1016\/s0097-8493(98)00030-2","relation":{},"ISSN":["0097-8493"],"issn-type":[{"value":"0097-8493","type":"print"}],"subject":[],"published":{"date-parts":[[1998,8]]}}}