{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:29:11Z","timestamp":1729610951268,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cccrv.2004.1301446","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"209-216","source":"Crossref","is-referenced-by-count":3,"title":["On the limits of second generation watermarks"],"prefix":"10.1109","author":[{"given":"B.","family":"Abdel-Aziz","sequence":"first","affiliation":[]},{"family":"Jiying Zhao","sequence":"additional","affiliation":[]},{"given":"J.-Y.","family":"Chouinard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45496-9_25","article-title":"Second generation benchmarking and application oriented evaluation","author":"pereira","year":"2001","journal-title":"Information Hiding Workshop"},{"key":"16","first-page":"1951","article-title":"Performance analysis of a content authentication semi-fragile watermark","author":"abdel-aziz","year":"2003","journal-title":"IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) 2003"},{"key":"13","article-title":"A stochastic approach to content adaptive digital image watermarking","author":"voloshynovskiy","year":"1999","journal-title":"International Workshop on Information Hiding"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1993.253132"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-61568-9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24624-4_21"},{"key":"3","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/MMCS.1999.779316","article-title":"Template based recovery of Fourier-based watermarks using log-polar and log-log maps","volume":"1","author":"pereira","year":"1999","journal-title":"IEEE Multimedia Systems 99 Int l Conf Multimedia Computing and Systems"},{"key":"2","article-title":"Triangular Meshes: A solution to resist to geometric distortions based watermark-removal softwares","author":"davoine","year":"2000","journal-title":"Proc European Signal Processing Conference (EUSIPCO) 2000"},{"key":"1","first-page":"219","article-title":"Attacks on copyright marking systems","author":"petitcolas","year":"1998","journal-title":"Information Hiding Second Int l Workshop"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.5244\/C.2.23"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815959"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"5","first-page":"103","article-title":"Video watermarking system for broadcast monitoring","author":"kalker","year":"1999","journal-title":"Proc Security Watermarking System Broadcast Monitoring"},{"key":"4","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1117\/12.435423","article-title":"The watermark template attack","volume":"4314","author":"herrigel","year":"2001","journal-title":"Proceedings of the SPIE Security and Water-marking of Multimedia Contents III"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.801587"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.821622"}],"event":{"name":"First Canadian Conference on Computer and Robot Vision, 2004.","location":"London, ON, Canada"},"container-title":["First Canadian Conference on Computer and Robot Vision, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9122\/28918\/01301446.pdf?arnumber=1301446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:57:31Z","timestamp":1497599851000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1301446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cccrv.2004.1301446","relation":{},"subject":[]}}