{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:29:00Z","timestamp":1729621740112,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/icip.2010.5651418","type":"proceedings-article","created":{"date-parts":[[2010,12,11]],"date-time":"2010-12-11T04:00:11Z","timestamp":1292040011000},"page":"213-216","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of the resistance of the Spread Transform against Temporal Frame Averaging attack"],"prefix":"10.1109","author":[{"given":"Sofiane","family":"Braci","sequence":"first","affiliation":[]},{"given":"Remy","family":"Boyer","sequence":"additional","affiliation":[]},{"given":"Claude","family":"Delpha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTA.2007.61"},{"key":"11","first-page":"461","article-title":"Thoughts on inverse orthogonal matrices, simultaneous sign successions, and tessellated pavements in two or more colours, with applications to Newton's rule, ornamental tile-work, and the theory of numbers","author":"sylvester","year":"1867","journal-title":"Philosophical Magazine"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1117\/3.626142"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(02)00144-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2003.1221664"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.833867"},{"journal-title":"Computer Vision and Image Processing","year":"1999","author":"scott","key":"10"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1117\/12.465294","article-title":"Applied public-key steganography","author":"guillon","year":"2002","journal-title":"Proc SPIE"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"5","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/11551492_13","article-title":"Effectiveness of STDM watermarking against intra-video collusion","volume":"3710","author":"caldelli","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2004.840617"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809366"},{"journal-title":"Digital Watermarking and Steganography","year":"2008","author":"cox","key":"8"}],"event":{"name":"2010 17th IEEE International Conference on Image Processing (ICIP 2010)","start":{"date-parts":[[2010,9,26]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 IEEE International Conference on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5641636\/5648792\/05651418.pdf?arnumber=5651418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T17:08:51Z","timestamp":1497892131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5651418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icip.2010.5651418","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}