{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:32:04Z","timestamp":1730230324606,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/icassp.2012.6288360","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T15:58:06Z","timestamp":1347033486000},"page":"2245-2248","source":"Crossref","is-referenced-by-count":1,"title":["Two-layer fragilewatermarking method for enhanced tampering localisation"],"prefix":"10.1109","author":[{"given":"Sergio","family":"Bravo-Solorio","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Asoke K.","family":"Nandi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"263","reference":[{"journal-title":"Probability and Statistics","year":"1975","author":"degroot","key":"13"},{"journal-title":"Caltech-256 Object Category Dataset","year":"2007","author":"griffin","key":"14"},{"key":"11","first-page":"147","article-title":"Block-chain based fragile watermarking scheme with superior localization","author":"he","year":"0","journal-title":"Proc of IH - Information Hiding 2008"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.07.019"},{"key":"3","first-page":"455","article-title":"A public key watermark for image verification and authentication","volume":"1","author":"wong","year":"0","journal-title":"Proc of ICIP - IEEE International Conference on Image Processing Chicago IL USA 1998"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.833105"},{"journal-title":"Digital Watermarking and Steganography","year":"2008","author":"cox","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2007.896436"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.06.003"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.02.007"},{"key":"5","first-page":"691","article-title":"Security of fragile authentication watermarks with localization","volume":"4675","author":"fridrich","year":"0","journal-title":"Proc of Security and Watermarking of Multimedia Contents CA USA 2002"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/83.826780"},{"key":"9","first-page":"422","article-title":"A wavelet-based fragile watermarking scheme for secure image authentication","volume":"4283","author":"he","year":"0","journal-title":"Proceedings on the 5th International Workshop on Digital Watermarking 2006"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1117\/1.2712445"}],"event":{"name":"ICASSP 2012 - 2012 IEEE International Conference on Acoustics, Speech and Signal Processing","start":{"date-parts":[[2012,3,25]]},"location":"Kyoto, Japan","end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6268628\/6287775\/06288360.pdf?arnumber=6288360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:49:22Z","timestamp":1490118562000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6288360\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icassp.2012.6288360","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}