{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:14:40Z","timestamp":1729646080381,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icarcv.2004.1468994","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T13:52:28Z","timestamp":1122472348000},"page":"1083-1087","source":"Crossref","is-referenced-by-count":0,"title":["Content-based watermarking scheme for image authentication"],"prefix":"10.1109","volume":"2","author":[{"family":"Shengsheng Yu","sequence":"first","affiliation":[]},{"family":"Yuping Hu","sequence":"additional","affiliation":[]},{"family":"Jingli Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"88","article-title":"Detection of image alterations using semi-fragile watermark","volume":"3971","author":"lin","year":"2000","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.821552"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.811621"},{"key":"1","first-page":"1556","article-title":"The survey of digital watermarking-based image authentication techniques","author":"liu","year":"2002","journal-title":"2002 Proceedings International Conference on"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/83.862633"},{"key":"6","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1117\/12.384968","article-title":"Semi fragile watermarking for authentication JPEG visual content","volume":"3971","author":"lin","year":"2000","journal-title":"Proc SPIE Security Watermarking Multimedia Contents II"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/5.771070"},{"key":"4","first-page":"4\/1","article-title":"a blind watermarking scheme based on structured codebooks","author":"eggers","year":"2000","journal-title":"IEE Seminar on Secure Images and Image Authentication"},{"journal-title":"Cryptography and Network Security Second Edition","year":"1998","author":"stallings","key":"9"},{"journal-title":"RFC1321 The md5 message-digest algorithm","year":"1992","author":"rivest","key":"8"}],"event":{"name":"2004 8th International Conference on Control, Automation, Robotics and Vision (ICARCV)","acronym":"ICARCV-04","location":"Kunming, China"},"container-title":["ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9908\/31512\/01468994.pdf?arnumber=1468994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T17:35:59Z","timestamp":1497634559000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1468994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icarcv.2004.1468994","relation":{},"subject":[]}}