{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:27:12Z","timestamp":1761647232981},"reference-count":68,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2003,10]]},"DOI":"10.1016\/s0165-1684(03)00172-5","type":"journal-article","created":{"date-parts":[[2003,8,1]],"date-time":"2003-08-01T01:24:25Z","timestamp":1059701065000},"page":"2133-2170","source":"Crossref","is-referenced-by-count":48,"title":["Secure hybrid robust watermarking resistant against tampering and copy attack"],"prefix":"10.1016","volume":"83","author":[{"given":"F.","family":"Deguillaume","sequence":"first","affiliation":[]},{"given":"S.","family":"Voloshynovskiy","sequence":"additional","affiliation":[]},{"given":"T.","family":"Pun","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0165-1684(03)00172-5_BIB1","unstructured":"A. Alattar, Smart images using Digimarc's watermarking technology, in: IS&T\/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Contents II. Vol. 3971, San Jose, CA, USA, January 23\u201328, 2000."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB2","doi-asserted-by":"crossref","unstructured":"P.S.L.M. Barreto, H.Y. Kim, V. Rijmen, Toward a secure public-key blockwise fragile authentication watermarking, in: IEEE Proceedings of the International Conference on Image Processing ICIP 2001, Thessaloniki, Greece, October 2001, pp. 494\u2013497.","DOI":"10.1109\/ICIP.2001.958536"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB3","doi-asserted-by":"crossref","unstructured":"C. Berrou, A. Glavieux, Near optimum error correcting coding and decoding: Turbo-codes. IEEE Trans. Comm. (October 1996) 1261\u20131271.","DOI":"10.1109\/26.539767"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB4","doi-asserted-by":"crossref","unstructured":"S. Bhattacharjee, M. Kutter, Compression tolerant image authentication, in: IEEE International Conference on Image Processing \u201998 Proceedings, Chicago, IL, USA, October 1998, Focus Interactive Technology Inc.","DOI":"10.1109\/ICIP.1998.723518"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB5","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.1016\/0167-8655(96)00062-1","article-title":"Representations that uniquely characterize images modulo translation, rotation, and scaling","volume":"17","author":"Brandt","year":"1996","journal-title":"Pattern Recognition Lett."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB6","doi-asserted-by":"crossref","unstructured":"M.U. Celik, G. Sharma, E. Saber, A.M. Tekalp, A hierarchical image authentication watermark with improved localization and security, in: IEEE Proceedings of the International Conference on Image Processing ICIP 2001, Thessaloniki, Greece, October 2001, pp. 502\u2013505.","DOI":"10.1109\/ICIP.2001.958538"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB7","doi-asserted-by":"crossref","unstructured":"B. Chen, G.W. Wornell, Digital watermarking and information embedding using dither modulation, in: IEEE Second Workshop on Multimedia Signal Processing (MMSP-98), Redondo Beach, USA, December 1998, pp. 273\u2013278.","DOI":"10.1109\/MMSP.1998.738946"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB8","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","article-title":"Quantization index modulation","volume":"47","author":"Chen","year":"2001","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB9","unstructured":"D. Coppersmith, F.C. Mintzer, C.P. Tresser, C.W. Wu, M.M. Yeung, Fragile imperceptible digital watermark with privacy control, in: IS&T\/SPIE's 11th Annual Symposium, Electronic Imaging \u201999: Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, CA, USA, January 1999, pp. 79\u201384."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB10","doi-asserted-by":"crossref","unstructured":"F. Deguillaume, S. Voloshynovskiy, T. Pun, Method for the estimation and recovering of general affine transforms in digital watermarking applications, in: IS&T\/SPIE's 14th Annual Symposium, Electronic Imaging 2002: Security and Watermarking of Multimedia Contents IV, Vol. 4675, San Jose, CA, USA, January 20\u201325 2002, pp. 313\u2013322.","DOI":"10.1117\/12.465289"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB11","doi-asserted-by":"crossref","unstructured":"J. Eggers, J. Su, B. Girod, A blind watermarking scheme based on structured codebooks, in: Secure images and image authentication, IEE Colloquium, London, UK, April 2000, pp. 4\/1\u20134\/6.","DOI":"10.1049\/ic:20000215"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB12","doi-asserted-by":"crossref","unstructured":"J. Fridrich, A hybrid watermark for tamper detection in digital images, in: ISSPA\u201999 Conference, Brisbane, Australia, August 22\u201325 1999, pp. 301\u2013304.","DOI":"10.1109\/ISSPA.1999.818172"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB13","unstructured":"J. Fridrich, Visual hash for oblivious watermarking, in: IS&T\/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Contents II, Vol. 3971, San Jose, CA, USA, January 24\u201326, 2000, pp. 286\u2013294."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB14","unstructured":"J. Fridrich, Security of fragile authentication watermarks with localization, in: IS&T\/SPIE's 14th Annual Symposium, Electronic Imaging 2002: Security and Watermarking of Multimedia Contents IV, Vol. 4675, San Jose, CA, USA, January 2002, pp. 691\u2013700."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB15","unstructured":"J. Fridrich, M. Goljan, Protection of digital images using self embedding, in: Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, USA, May 1999."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB16","doi-asserted-by":"crossref","unstructured":"J. Fridrich, M. Goljan, A.C. Baldoza, New fragile authentication watermark for images, in: IEEE International Conference on Image Processing ICIP2000, Vancouver, Canada, September 2000.","DOI":"10.1109\/ICIP.2000.900991"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB17","doi-asserted-by":"crossref","unstructured":"J. Fridrich, M. Goljan, N. Memon, Further attacks on Yeung\u2013Mintzer fragile watermarking scheme, in: IS&T\/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Contents II, San Jose, CA, USA, January 2000, pp. 428\u2013437.","DOI":"10.1117\/12.384997"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB18","doi-asserted-by":"crossref","unstructured":"J. Fridrich, M. Goljan, N. Memon, Cryptanalysis of the Yeung\u2013Mintzer fragile watermarking technique, J. Electron. Imaging 11 (2) (April 2002) 262\u2013274.","DOI":"10.1117\/1.1459449"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB19","doi-asserted-by":"crossref","unstructured":"G.L. Friedman, The trustworthy digital camera: restoring credibility to the photographic image, IEEE Trans. Consumer Electr. 39 (November 1993) 905\u2013910.","DOI":"10.1109\/30.267415"},{"year":"1963","series-title":"Low-Density Parity-Check Codes","author":"Gallager","key":"10.1016\/S0165-1684(03)00172-5_BIB20"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB21","doi-asserted-by":"crossref","unstructured":"H. Harashima, H. Miyakawa, Matched-transmission technique for channels with intersymbol interference, IEEE Trans. Comm. 20 (4) (August 1972) 774\u2013780.","DOI":"10.1109\/TCOM.1972.1091221"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB22","doi-asserted-by":"crossref","unstructured":"H. Hel-Or, Y. Yitzhaki, Y. Hel-Or, Geometric hashing techniques for watermarking, in: ICIP 2001, Thessaloniki, Greece, January 2001.","DOI":"10.1109\/ICIP.2001.958537"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB23","doi-asserted-by":"crossref","unstructured":"J.R. Hern\u00e1ndez, F. P\u00e9rez-Gonz\u00e1lez, J.M. Rodr\u00edgez, G. Nieto, The impact of channel coding on the performance of spatial watermarking for copyright protection, in: Proceedings of the ICASSP\u201998, Vol. 5, May 1998, pp. 2973\u20132976.","DOI":"10.1109\/ICASSP.1998.678150"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB24","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/83.826780","article-title":"Couterfeting attacks on oblivious block-wise independant invisible watermarking schemes","volume":"9","author":"Holliman","year":"2000","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB25","unstructured":"P. Hough, Method and means for recognizing complex patterns, 1962, U.S. Patent 3069654."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB26","unstructured":"D. Johnson, A. Menezes, The Elliptic Curve Digital Signature Algorithm (ECDSA), Corr 99-34, Department of C&O, University of Waterloo, August 1999."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB27","unstructured":"A.C.C. Kalker, G. Depovere, J. Haitsma, M.J. Maes, A video watermarking system for broadcast monitoring, in: IS&T\/SPIE's 11th Annual Symposium, Electronic Imaging\u201999: Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, CA, USA, January 1999, pp. 103\u2013112."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB28","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"issue":"7","key":"10.1016\/S0165-1684(03)00172-5_BIB29","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/5.771070","article-title":"Digital watermarking for telltale tamper proofing and authentication","volume":"87","author":"Kundur","year":"1999","journal-title":"Proc. IEEE"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB30","unstructured":"M. Kutter, Digital image watermarking: hiding information in images, Ph.D. Thesis, EPFL, Lausanne, Switzerland, August 1999."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB31","unstructured":"M. Kutter, S. Voloshynovskiy, A. Herrigel, Watermark copy attack, in: IS&T\/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Contents II, Vol. 3971, San Jose, CA, USA, January 23\u201328 2000."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB32","doi-asserted-by":"crossref","unstructured":"X. Lai, J.L. Massey, A proposal for a new block encryption standard, in: I.B. Damgard (Ed.), Lecture Notes in Computer Science (EUROCRYPT\u201990), Advances in Cryptology, Springer, Vol. 473, 1991, pp. 389\u2013404.","DOI":"10.1007\/3-540-46877-3_35"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB33","unstructured":"C.-Y. Lin, S.-F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, in: IS&T\/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, Vol. 3971, San Jose, CA, USA, January 23\u201328 2000, pp. 140\u2013151."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB34","unstructured":"E.T. Lin, C.I. Podilchuk, E.J. Delp, Detection of image alterations using semi-fragile watermarks, in: IS&T\/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, Vol. 3971, San Jose, CA, USA, January 23\u201328 2000."},{"year":"1996","series-title":"Handbook of Applied Cryptography","author":"Menezes","key":"10.1016\/S0165-1684(03)00172-5_BIB35"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB36","doi-asserted-by":"crossref","unstructured":"V.S. Miller, Uses of elliptic curves in cryptography, in: Advances in Cryptology CRYPTO\u201985, Vol. 218, 1985, pp. 417\u2013426.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB37","unstructured":"M.L. Miller, I.J. Cox, J.A. Bloom, Watermarking in the real world: an application to DVD, in: P. Horster, J. Dittmann, P. Wohlmacher, R. Steinmetz (Eds.), Proceedings of Multimedia and Security Workshop at ACM Multimedia 98 (GMD Report), Vol. 41, Bristol, UK, September 1998, pp. 71\u201376."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB38","unstructured":"University of Geneva Watermarking Group, Watermarking Group Technology, 2002, http:\/\/watermark.unige.ch\/wmg_technology.html."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB39","unstructured":"National Institute of Standards and Technology (NIST), Secure Hash Standard, May 1993, Federal Information Processing Standards Publications (FIPS) PUB 180-1."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB40","unstructured":"National Institute of Standards and Technology (NIST), Data Encryption Standard (DES), October 1999, Federal Information Processing Standards Publications (FIPS) PUB 46-3."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB41","unstructured":"National Institute of Standards and Technology (NIST), Digital Signature Standard (DSS), February 2000, Federal Information Processing Standards Publications (FIPS) PUB 186-2."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB42","doi-asserted-by":"crossref","unstructured":"National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), November 2001, Federal Information Processing Standards Publications (FIPS) PUB 197.","DOI":"10.6028\/NIST.FIPS.197"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB43","doi-asserted-by":"crossref","unstructured":"J.J.K. \u00d3ruanaidh, G. Csurka, A Bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries, in: IEEE Conference on Computer Vision and Pattern Recognition, Fort Collins, Colorado, USA, June 1999.","DOI":"10.1109\/CVPR.1999.786940"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB44","doi-asserted-by":"crossref","unstructured":"J.J.K. \u00d3ruanaidh, T. Pun, Rotation, scale and translation invariant digital image watermarking, in: IEEE International Conference on Image Processing ICIP1997, Santa Barbara, CA, USA, October 1997, pp. 536\u2013539.","DOI":"10.1109\/ICIP.1997.647968"},{"issue":"3","key":"10.1016\/S0165-1684(03)00172-5_BIB45","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","article-title":"Rotation, scale and translation invariant spread spectrum digital image watermarking","volume":"66","author":"\u00d3ruanaidh","year":"1998","journal-title":"Signal Process."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB46","doi-asserted-by":"crossref","unstructured":"S. Pereira, J.J.K. \u00d3ruanaidh, F. Deguillaume, G. Csurka, T. Pun, Template based recovery of Fourier-based watermarks using Log-polar and Log-log maps, in: International Conference on Multimedia Computing and Systems, Special Session on Multimedia Data Security and Watermarking, Vol. 1, Florence, Italy, June 1999, pp. 870\u2013874.","DOI":"10.1109\/MMCS.1999.779316"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB47","unstructured":"F.A.P. Petitcolas, Stirmark benchmark 4.0. 2002, http:\/\/www.cl.cam.ac.uk\/~fapp2\/watermarking\/stirmark\/."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB48","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD5 message-digest algorithm, April 1992, Request for Comments (RFC) 1321, MIT LCS and RSA Data Security, Inc.","DOI":"10.17487\/rfc1321"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB49","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB50","doi-asserted-by":"crossref","unstructured":"M. Schneider, S. Chang, A robust content based digital signature for image authentication, in: Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, September 1996, pp. 227\u2013230.","DOI":"10.1109\/ICIP.1996.560425"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB51","doi-asserted-by":"crossref","unstructured":"T. Tomlinson, New automatic equalizer employing modulo arithmetic, Electron. Lett. 7 (March 1971) 138\u2013139.","DOI":"10.1049\/el:19710089"},{"issue":"5","key":"10.1016\/S0165-1684(03)00172-5_BIB52","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1109\/TCOMM.2002.1006557","article-title":"Turbo equalization","volume":"50","author":"T\u00fcchler","year":"2002","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB53","unstructured":"R. Venkatesanan, S. Koon, M. Jacubowski, P. Moulin, Robust image hashing, in: ICIP 2000, Vancouver, BC, Canada, September 2000."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB54","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy, F. Deguillaume, O. Koval, T. Pun, Robust watermarking with channel state estimation, Part I: theoretical analysis, Signal Processing: Security of Data Hiding Technologies, (Special Issue) 2003\u20132004, to appear.","DOI":"10.1016\/S0165-1684(03)00172-5"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB55","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy, F. Deguillaume, O. Koval, T. Pun, Robust watermarking with channel state estimation, Part II: applied robust watermarking, Signal Processing: Security of Data Hiding Technologies, (Special Issue) 2003\u20132004, to appear.","DOI":"10.1016\/S0165-1684(03)00172-5"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB56","unstructured":"S. Voloshynovskiy, F. Deguillaume, S. Pereira, A. Herrigel, T. Pun, Method for adaptive digital watermarking robust against geometric transforms, European Patent Application PCT\/IB00\/01089, August 3 2000."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB57","unstructured":"S. Voloshynovskiy, F. Deguillaume, S. Pereira, T. Pun, Optimal diversity watermarking with channel state estimation, in: IS&T\/SPIE's 13th Annual Symposium, Electronic Imaging 2001: Security and Watermarking of Multimedia Contents III, Vol. 4134, San Jose, CA, USA, January 21\u201326 2001, pp. 23\u201327."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB58","unstructured":"S. Voloshynovskiy, F. Deguillaume, T. Pun, Content adaptive watermarking based on a stochastic multiresolution image modeling, in: Tenth European Signal Processing Conference EUSIPCO2000, Tampere, Finland, September 2000."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB59","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy, F. Deguillaume, T. Pun, Multibit digital watermarking robust against local nonlinear geometrical distortions, in: IEEE International Conference on Image Processing ICIP2001, Thessaloniki, Greece, October 2001, pp. 999\u20131002.","DOI":"10.1109\/ICIP.2001.958294"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB60","unstructured":"S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, T. Pun, A stochastic approach to content adaptive digital image watermarking, in: Third International Workshop on Information Hiding, Vol. 1768, Dresden, Germany, September 29\u2013October 1st 1999, pp. 212\u2013236."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB61","doi-asserted-by":"crossref","unstructured":"S. Voloshynovskiy, T. Pun, Capacity-security analysis of data hiding technologies, in: IEEE International Conference on Multimedia and Expo ICME2002, Lausanne, Switzerland, August 26\u201329, 2002.","DOI":"10.1109\/ICME.2002.1035649"},{"issue":"4","key":"10.1016\/S0165-1684(03)00172-5_BIB62","first-page":"18","article-title":"Information authentication for a slippery new age","volume":"20","author":"Walton","year":"1995","journal-title":"Dr. Dobbs J."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB63","unstructured":"R.B. Wolfgang, E.J. Delp, Fragile watermarking using the VW2D watermark, in: IS&T\/SPIE's 11th Annual Symposium, Electronic Imaging \u201999: Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, CA, USA, January 25\u201327 1999, pp. 204\u2013213."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB64","unstructured":"P.W. Wong, A public key watermark for image verification and authentication, in: IEEE International Conference on Image Processing \u201998 (ICIP\u201998) Proceedings, Vol. 1, 1998, MA11.07."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB65","doi-asserted-by":"crossref","unstructured":"P.W. Wong, N. Memon, Secret and public key authentication watermarking schemes that resist vector quantization attack, in: IS&T\/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Contents II, Vol. 3971, San Jose, CA, USA, January 2002, pp. 417\u2013427.","DOI":"10.1117\/12.384996"},{"key":"10.1016\/S0165-1684(03)00172-5_BIB66","unstructured":"M. Wu, B. Liu, Watermarking for image authentication, in: IEEE International Conference on Image Processing \u201998 (ICIP\u201998) Proceedings, Chicago, IL, USA, October 1998, Focus Interactive Technology Inc., TA10.11."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB67","unstructured":"L. Xie, G.R. Arce, Joint wavelet compression and authentication watermarking, in: IEEE International Conference on Image Processing \u201998 Proceedings, Chicago, IL, USA, October 1998, Focus Interactive Technology Inc."},{"key":"10.1016\/S0165-1684(03)00172-5_BIB68","doi-asserted-by":"crossref","unstructured":"M.M. Yeung, F.C. Mintzer, An invisible watermarking technique for image verification, in: 1997 International Conference on Image Processing (ICIP \u201997), Vol. 2, Washington, DC, USA, October 26\u201329 1997, pp. 680\u2013683.","DOI":"10.1109\/ICIP.1997.638587"}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168403001725?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168403001725?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T21:40:24Z","timestamp":1585086024000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168403001725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10]]},"references-count":68,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2003,10]]}},"alternative-id":["S0165168403001725"],"URL":"https:\/\/doi.org\/10.1016\/s0165-1684(03)00172-5","relation":{},"ISSN":["0165-1684"],"issn-type":[{"type":"print","value":"0165-1684"}],"subject":[],"published":{"date-parts":[[2003,10]]}}}