{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:14:51Z","timestamp":1725470091716},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/dicta.2014.7008125","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:45:43Z","timestamp":1421703943000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Quantization Based Watermarking Approach with Gain Attack Recovery"],"prefix":"10.1109","author":[{"given":"Yevhen","family":"Zolotavkin","sequence":"first","affiliation":[]},{"given":"Martti","family":"Juhola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SNS-PCS.2013.6553862"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2013.0048"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2012-53"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855407"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415525"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2001361"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.881216"},{"journal-title":"Digital Watermarking and Steganography","year":"2007","author":"cox","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859378"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.1997.628384"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1117\/12.526586","article-title":"Adaptive quantization watermarking","author":"oostveen","year":"2004","journal-title":"Security Steganography and Watermarking of Multimedia"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312595"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1117\/12.344684","article-title":"Dither modulation: A new approach to digital watermarking and information embedding","author":"chen","year":"1999","journal-title":"Proceedings of SPIE 3657 Security and Watermarking of Multimedia Content"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056659"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809366"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.823468"}],"event":{"name":"2014 International Conference on Digital Image Computing: Techniques and Applications (DICTA)","start":{"date-parts":[[2014,11,25]]},"location":"Wollongong, New South Wales, Australia","end":{"date-parts":[[2014,11,27]]}},"container-title":["2014 International Conference on Digital Image Computing: Techniques and Applications (DICTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005557\/7008073\/07008125.pdf?arnumber=7008125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T23:54:56Z","timestamp":1498175696000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7008125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/dicta.2014.7008125","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}