{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:27:03Z","timestamp":1742390823895},"reference-count":18,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2001,2,1]],"date-time":"2001-02-01T00:00:00Z","timestamp":980985600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2001,2]]},"DOI":"10.1016\/s0140-3664(00)00309-1","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T17:16:12Z","timestamp":1027617372000},"page":"144-154","source":"Crossref","is-referenced-by-count":7,"title":["Automatic proxy-based watermarking for WWW"],"prefix":"10.1016","volume":"24","author":[{"given":"C.-H","family":"Chi","sequence":"first","affiliation":[]},{"given":"Y","family":"Lin","sequence":"additional","affiliation":[]},{"given":"J","family":"Deng","sequence":"additional","affiliation":[]},{"given":"X","family":"Li","sequence":"additional","affiliation":[]},{"given":"T.-S","family":"Chua","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(00)00309-1_BIB1","doi-asserted-by":"crossref","unstructured":"M. Abrams, C.R. Standridge, G. Abdulla, S. Williams, Caching proxies: limitations and potentials, Proceedings of the Fourth International World Wide Web Conference, December 1995, http:\/\/www.w3.org\/Conferences\/WWW4\/Papers\/155\/.","DOI":"10.1145\/3592626.3592635"},{"key":"10.1016\/S0140-3664(00)00309-1_BIB2","doi-asserted-by":"crossref","unstructured":"C. Brooks, M.X. Mazer, S. Meks, J. Miller, Application-specific proxy servers as HTTP stream transducers, Proceedings of the World Wide Web Conference, 1995, http:\/\/www\/w3\/org\/Conferences\/WWW4\/papers\/56.","DOI":"10.1145\/3592626.3592670"},{"key":"10.1016\/S0140-3664(00)00309-1_BIB3","unstructured":"C.H. Chi, J. Deng, Y.H. Lim, Compression proxy server: design and implementation, Proceedings of the Second USENIX Conference on Internet Technologies and Systems, 1999."},{"key":"10.1016\/S0140-3664(00)00309-1_BIB4","unstructured":"CSM-connect with confidence and systems, 1999, http:\/\/www.csm-usa.com\/."},{"key":"10.1016\/S0140-3664(00)00309-1_BIB5","unstructured":"A. Fox, S.D. Gribble, Y. Chawathe, E.A. Brewer, Adapting to network and client variation using infrastructural proxies: lessons and perspectives, Proceedings of ASPLOS-VII, 1996."},{"key":"10.1016\/S0140-3664(00)00309-1_BIB6","doi-asserted-by":"crossref","unstructured":"A. Fox, S.D. Gribble, Y. Chawathe, E.A. Brewer, P. Gauthier, Cluster-based scalable network services, Proceedings of 16th ACM Symposium on Operation System Principles, 1997, pp. 78\u201391.","DOI":"10.1145\/268998.266662"},{"key":"10.1016\/S0140-3664(00)00309-1_BIB7","doi-asserted-by":"crossref","unstructured":"A. Fox, S.D. Gribble, Y. Chawathe, E.A. Brewer, Adapting to network and client variability via on-demand distillation, Proceedings of the 16th Symposium on Operating Systems, October, 1997.","DOI":"10.1145\/237090.237177"},{"key":"10.1016\/S0140-3664(00)00309-1_BIB8","unstructured":"A. Fox, A framework for separating server scalability and availability from internet application functionality, PhD dissertation, Computer Science in the Graduate Division of the University of California at Berkeley, 1998, http:\/\/gunpowder.Stanford.EDU\/~fox\/PAPERS\/thesis.ps.gz."},{"issue":"4","key":"10.1016\/S0140-3664(00)00309-1_BIB9","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/273035.273048","article-title":"Digital access to antiquities","volume":"41","author":"Gladney","year":"1998","journal-title":"Communication of ACM"},{"key":"10.1016\/S0140-3664(00)00309-1_BIB10","article-title":"Safeguarding digital library contents and users: digital images of treasured antiquities","volume":"July\/August","author":"Gladney","year":"1997","journal-title":"D-Lib Magazine"},{"issue":"7","key":"10.1016\/S0140-3664(00)00309-1_BIB11","doi-asserted-by":"crossref","DOI":"10.1109\/5.771066","article-title":"Multimedia watermarking techniques","volume":"87","author":"Hartung","year":"1999","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S0140-3664(00)00309-1_BIB12","doi-asserted-by":"crossref","unstructured":"M. Kutter, F. Jordan, F. Bossen, Digital signature of color images using amplitude modulation, Proceedings of the Electronic Imaging Conference, February 1997.","DOI":"10.1117\/12.263442"},{"issue":"7","key":"10.1016\/S0140-3664(00)00309-1_BIB13","doi-asserted-by":"crossref","DOI":"10.1145\/278476.278485","article-title":"Protecting digital media content","volume":"41","author":"Memon","year":"1998","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0140-3664(00)00309-1_BIB14","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/ICIP.1997.631957","article-title":"Effective and ineffective digital watermarking","volume":"3","author":"Mintzer","year":"1997","journal-title":"Proceedings of the IEEE International Conference on Image Processing"},{"issue":"7","key":"10.1016\/S0140-3664(00)00309-1_BIB15","doi-asserted-by":"crossref","DOI":"10.1145\/278476.278487","article-title":"Opportunities for watermarking standards","volume":"41","author":"Mintzer","year":"1998","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0140-3664(00)00309-1_BIB16","unstructured":"Squid web site, http:\/\/squid.nlanr.net."},{"key":"10.1016\/S0140-3664(00)00309-1_BIB17","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1109\/30.735826","article-title":"Perceptual Digital watermark of images using wavelet transform","volume":"November","author":"Wei","year":"1998","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"7","key":"10.1016\/S0140-3664(00)00309-1_BIB18","doi-asserted-by":"crossref","DOI":"10.1145\/278476.278484","article-title":"Digital watermarking","volume":"41","author":"Yeung","year":"1998","journal-title":"Communications of the ACM"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400003091?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400003091?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,12,31]],"date-time":"2023-12-31T21:33:09Z","timestamp":1704058389000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366400003091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,2]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2001,2]]}},"alternative-id":["S0140366400003091"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(00)00309-1","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2001,2]]}}}