{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:04:34Z","timestamp":1729659874300,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/comswa.2008.4554483","type":"proceedings-article","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T15:07:51Z","timestamp":1292598471000},"page":"608-613","source":"Crossref","is-referenced-by-count":0,"title":["Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique"],"prefix":"10.1109","member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2004.1434408"},{"key":"ref32","first-page":"1","article-title":"Blind pattern matching attack on watermarking systems","author":"kirovski","year":"2002","journal-title":"IEEE Trans on Signal Proc"},{"key":"ref31","first-page":"23","article-title":"The watermark copy attack","volume":"3971","author":"kutter","year":"2000","journal-title":"Proc SPIE Electron Imag"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/83.826780"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1994.413283"},{"key":"ref10","first-page":"425","article-title":"A public key watermark for image verification and authentication","author":"wong","year":"1998","journal-title":"Proc Of IEEE International Conf on Image Processing"},{"key":"ref11","article-title":"Secret and public key image watermarking schemes for image authentication and ownership verification","volume":"10","author":"wong","year":"2001","journal-title":"IEEE Trans on Image Proc"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20020168"},{"key":"ref13","article-title":"Hierarchical watermarking for secure image authentication with localization","volume":"11","author":"celik","year":"2002","journal-title":"IEEE Trans on Image Proc"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958538"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1117\/12.384969","article-title":"Detection of image alterations using semi-fragile watermarks","volume":"3971","author":"lin","year":"2000","journal-title":"Proc SPIE Conf Security and Watermarking of Multimedia Contents II"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1117\/1.1633285"},{"key":"ref17","first-page":"19","article-title":"Methods for Tamper Detection in Digital Images","author":"fridrich","year":"1999","journal-title":"Proc ACM Workshop on Multimedia and Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.778542"},{"key":"ref19","first-page":"286","article-title":"Visual Hash for Oblivious Watermarking","author":"fridrich","year":"2000","journal-title":"Proc SPIE Photonic West Electronic Imaging 2000 Security and Watermarking of Multimedia Contents"},{"key":"ref28","article-title":"Combined watermarking for image authentication and protection","author":"lu","year":"2000","journal-title":"IEEE Int Conf on Multimedia and Expo"},{"key":"ref4","article-title":"Handbook of Applied Cryptography","author":"menezes","year":"2001","journal-title":"CRC"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.1999.818172"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/79.939835"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/5.687830"},{"journal-title":"Hybrid robust watermarking resistance against copy attack","year":"0","author":"deguillaume","key":"ref29"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C","year":"1996","author":"schneier","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.638587"},{"key":"ref7","first-page":"25","article-title":"A review of fragile image watermarks","author":"lin","year":"1999","journal-title":"Proc ACM Workshop on Multimedia Security"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1109\/TIP.2003.810589","article-title":"Data hiding in image and video: Part-II","volume":"12","author":"wu","year":"2003","journal-title":"IEEE Trans on Image Proc"},{"key":"ref9","article-title":"A watermark for image integrity and ownership verification","author":"wong","year":"1997","journal-title":"Proc IS & TPIC Conf"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863505"},{"key":"ref20","first-page":"173","author":"fridrich","year":"2000","journal-title":"Robust Hash Functions for Digital Watermarking ITCC 2000 Las Vegas"},{"key":"ref22","article-title":"Robust high capacity data embedding","author":"lan","year":"2000","journal-title":"Proc IEEE Int Conf on Image Processing"},{"key":"ref21","article-title":"Fraud detection and self embedding","author":"lan","year":"1999","journal-title":"Proc of the 7th ACM Int Conf on Multimedia Part 2 Orlando"},{"key":"ref24","article-title":"Protection of digital images using self-embedding","author":"fridrich","year":"1999","journal-title":"Symposium on Content Security and Data Hiding in Digital Media NJ Inst of Technology"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/500141.500266"},{"key":"ref26","article-title":"A proposed semi-fragile watermarking scheme for image authentication","author":"al-sultan","year":"2004","journal-title":"Proc ICCTA'04 AASTMT Alexandria Egypt"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.817228"}],"event":{"name":"2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)","start":{"date-parts":[[2008,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2008,1,10]]}},"container-title":["2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4545865\/4554360\/04554483.pdf?arnumber=4554483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:25:10Z","timestamp":1497878710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4554483\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/comswa.2008.4554483","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}