{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:20:23Z","timestamp":1729639223825,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icip.2004.1421639","type":"proceedings-article","created":{"date-parts":[[2005,4,19]],"date-time":"2005-04-19T15:05:35Z","timestamp":1113923135000},"page":"2615-2618","source":"Crossref","is-referenced-by-count":1,"title":["A practical version of wong's watermarking technique"],"prefix":"10.1109","volume":"4","author":[{"given":"A.H.","family":"Ouda","sequence":"first","affiliation":[]},{"given":"M.R.","family":"El-Sakka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/83.951543"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/83.826780"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(92)90177-C"},{"key":"ref5","article-title":"The MD5 message digest algorithm","author":"rivest","year":"1992","journal-title":"IETF Tech Rep RFC"},{"key":"ref8","first-page":"263","article-title":"The magic words are squeamish ossifrage","author":"atkins","year":"1995","journal-title":"Advances in Cryptology LNCS 917"},{"key":"ref7","article-title":"RSA challenge","author":"rivest","year":"1977","journal-title":"Scientific American M Gardner's column"},{"key":"ref2","first-page":"471","article-title":"Secret and Public Key Authentication Watermarking Schemes that Resist Vector Quantization Attack","volume":"3971","author":"memon","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48000-6_16"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1109\/ICIP.1998.723526","article-title":"A Public Key Watermark for Image Verification and Authentication","volume":"1","author":"wong","year":"1998","journal-title":"IEEE International Conference on Image Processing (ICIP'98)"}],"event":{"name":"2004 International Conference on Image Processing, 2004. ICIP '04.","location":"Singapore"},"container-title":["2004 International Conference on Image Processing, 2004. ICIP '04."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9716\/30679\/01421639.pdf?arnumber=1421639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T14:36:24Z","timestamp":1497623784000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1421639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icip.2004.1421639","relation":{},"subject":[]}}