{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:01:48Z","timestamp":1760954508628,"version":"3.30.2"},"reference-count":26,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2003,10]]},"DOI":"10.1016\/s0165-1684(03)00171-3","type":"journal-article","created":{"date-parts":[[2003,8,1]],"date-time":"2003-08-01T01:24:25Z","timestamp":1059701065000},"page":"2117-2132","source":"Crossref","is-referenced-by-count":49,"title":["Wavelet packets-based digital watermarking for image verification and authentication"],"prefix":"10.1016","volume":"83","author":[{"given":"Alexandre H","family":"Paquet","sequence":"first","affiliation":[]},{"given":"Rabab K","family":"Ward","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Pitas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/S0165-1684(03)00171-3_BIB1","doi-asserted-by":"crossref","first-page":"1295","DOI":"10.1109\/TCOM.1978.1094224","article-title":"Quantizing characteristics for signals having Laplacian amplitude probability density function","volume":"26","author":"Adams","year":"1978","journal-title":"IEEE Trans. Comm."},{"issue":"8","key":"10.1016\/S0165-1684(03)00171-3_BIB2","first-page":"102","article-title":"Watermark embedding: hiding a signal within a cover image","volume":"39","author":"Barni","year":"2001","journal-title":"Special Issue IEEE Comm. Mag. Digital Watermarking Copyright Protect: Comm. Perspect."},{"issue":"10","key":"10.1016\/S0165-1684(03)00171-3_BIB3","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/5.959338","article-title":"Image authentication techniques for surveillance applications","volume":"89","author":"Bartollini","year":"2001","journal-title":"Proc. IEEE"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB4","doi-asserted-by":"crossref","unstructured":"S. Bhattacharjee, M. Kutter, Compression tolerant image authentication, in: IEEE International Conference on Image Processing (ICIP\u20191998), Vol. I, October 1998, pp. 435\u2013439.","DOI":"10.1109\/ICIP.1998.723518"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB5","doi-asserted-by":"crossref","unstructured":"I.J. Cox, J. Kilian, T. Leighton, T. Shamoon, Secure spread spectrum watermarking for images, audio, and video, in: IEEE International Conference on Image Processing (ICIP\u201996), Vol. III, 1996, pp. 243\u2013246.","DOI":"10.1109\/ICIP.1996.560429"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB6","doi-asserted-by":"crossref","unstructured":"I.J. Cox, M.L. Miller, J.A. Bloom, Watermarking applications and their properties, in: IEEE International Conference on Information Technology, 2000, pp. 6\u201310.","DOI":"10.1109\/ITCC.2000.844175"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB7","unstructured":"I.J. Cox, M.L. Miller, J.A. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, 2929 Campus Drive, Suite 260, San Mateo, CA 94403, USA, 2002."},{"key":"10.1016\/S0165-1684(03)00171-3_BIB8","doi-asserted-by":"crossref","unstructured":"I. Daubechies, Ten Lectures on Wavelets, Notes from the 1990 CBMS-NSF Conference on Wavelets and Applications at Lowell, MA, SIAM, Philadelphia, PA, 1992.","DOI":"10.1137\/1.9781611970104"},{"issue":"7","key":"10.1016\/S0165-1684(03)00171-3_BIB9","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/5.771066","article-title":"Multimedia watermarking techniques","volume":"87","author":"Hartung","year":"1999","journal-title":"Proc. IEEE"},{"issue":"10","key":"10.1016\/S0165-1684(03)00171-3_BIB10","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1109\/5.241504","article-title":"Signal compression based on models of human perception","volume":"81","author":"Jayant","year":"1993","journal-title":"Proc. IEEE"},{"issue":"7","key":"10.1016\/S0165-1684(03)00171-3_BIB11","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/5.771070","article-title":"Digital watermarking for telltale tamper proofing and authentication","volume":"87","author":"Kundur","year":"1999","journal-title":"Proc. IEEE"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB12","doi-asserted-by":"crossref","unstructured":"C. Lin, S. Chang, Semi-fragile watermarking for authenticating jpeg visual content, in: SPIE Security and Watermarking of Multimedia Content II, San Jose, CA, January 2000, pp. 140\u2013151.","DOI":"10.1117\/12.384968"},{"issue":"10","key":"10.1016\/S0165-1684(03)00171-3_BIB13","doi-asserted-by":"crossref","first-page":"1579","DOI":"10.1109\/83.951542","article-title":"Multipurpose watermarking for image authentication and protection","volume":"10","author":"Lu","year":"2001","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/S0165-1684(03)00171-3_BIB14","doi-asserted-by":"crossref","unstructured":"A. Lumini, D. Maio, Blind watermarking system for digital images in the wavelet domain, in: SPIE International Symposium Electronic Imaging Security and Watermarking of Multimedia Contents II, January 2000, pp. 524\u2013535.","DOI":"10.1117\/12.385008"},{"issue":"7","key":"10.1016\/S0165-1684(03)00171-3_BIB15","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1109\/34.192463","article-title":"A theory for multiresolution signal decomposition","volume":"11","author":"Mallat","year":"1989","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/S0165-1684(03)00171-3_BIB16","unstructured":"L.M. Marvel, C.T. Retter, The use of side information in image steganography, in: IEEE International Symposium on Information Theory and Its Applications (ISITA\u20192000), November 2000."},{"key":"10.1016\/S0165-1684(03)00171-3_BIB17","doi-asserted-by":"crossref","unstructured":"A.H. Paquet, Wavelet packets-based digital watermarking for image authentication, Master's thesis, University of British Columbia, Vancouver, BC, July 2002.","DOI":"10.1109\/CCECE.2002.1013058"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB18","doi-asserted-by":"crossref","unstructured":"A.H. Paquet, R.K. Ward, Wavelet-based digital watermarking for image authentication, in: IEEE Canadian Conference on Electrical and Computer Engineering, Vol. I, Winnipeg, Manitoba, May 2002, pp. 879\u2013884.","DOI":"10.1109\/CCECE.2002.1013058"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB19","doi-asserted-by":"crossref","unstructured":"A.H. Paquet, S. Zahir, R.K. Ward, Wavelet packets-based image retrieval, in: IEEE International Conference on Acoustics Speech and Signal Processing, Vol. IV, May 2002, pp. 3640\u20133643.","DOI":"10.1109\/ICASSP.2002.5745444"},{"issue":"4","key":"10.1016\/S0165-1684(03)00171-3_BIB20","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/79.939835","article-title":"Digital watermarking","volume":"18","author":"Podilchuk","year":"2001","journal-title":"IEEE Signal Process. Mag."},{"key":"10.1016\/S0165-1684(03)00171-3_BIB21","unstructured":"M.A. Tefas, I. Pitas, Image authentication and tamper proofing using mathematical morphology, in: European Signal Processing Conference (EUSIPCO\u20192000), September 2000."},{"key":"10.1016\/S0165-1684(03)00171-3_BIB22","doi-asserted-by":"crossref","unstructured":"M.A. Tefas, I. Pitas, Image authentication based on chaotic mixing, in: IEEE International Symposium on Circuits and Systems (ISCAS\u20192000), Vol. I, May 2000, pp. 216\u2013219.","DOI":"10.1109\/ISCAS.2000.857066"},{"issue":"7","key":"10.1016\/S0165-1684(03)00171-3_BIB23","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1109\/5.771072","article-title":"The use of watermarks in the protection of digital multimedia products","volume":"87","author":"Voyatzis","year":"1999","journal-title":"Proc. IEEE"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB24","doi-asserted-by":"crossref","unstructured":"M. Wu, B. Liu, Watermarking for image authentication, in: IEEE International Conference on Image Processing (ICIP\u20191998), Vol. II, October 1998, pp. 437\u2013441.","DOI":"10.1109\/ICIP.1998.723413"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB25","doi-asserted-by":"crossref","unstructured":"M.M. Yeung, F. Mintzer, An invisible watermarking techniques for image verification, in: IEEE International Conference on Image Processing (ICIP\u20191997), Vol. II, 1997, pp. 680\u2013683.","DOI":"10.1109\/ICIP.1997.638587"},{"key":"10.1016\/S0165-1684(03)00171-3_BIB26","unstructured":"G.J. Yu, C.-S. Lu, H.-Y.M. Liao, J.-P. Sheu, Mean quantization blind watermarking for image authentication, in: IEEE International Conference on Image Processing (ICIP\u20192000), Vol. III, Vancouver, BC, Canada, 2000, pp. 706\u2013709."}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168403001713?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168403001713?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T09:06:44Z","timestamp":1734080804000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168403001713"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10]]},"references-count":26,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2003,10]]}},"alternative-id":["S0165168403001713"],"URL":"https:\/\/doi.org\/10.1016\/s0165-1684(03)00171-3","relation":{},"ISSN":["0165-1684"],"issn-type":[{"type":"print","value":"0165-1684"}],"subject":[],"published":{"date-parts":[[2003,10]]}}}