{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:55:13Z","timestamp":1729608913563,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/icme.2007.4284885","type":"proceedings-article","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T16:48:46Z","timestamp":1188319726000},"page":"1255-1258","source":"Crossref","is-referenced-by-count":4,"title":["Semi-Fragile Watermarking Based on SVM for Image Authentication"],"prefix":"10.1109","author":[{"family":"Li Chun-hua","sequence":"first","affiliation":[]},{"given":"Ling","family":"He-fei","sequence":"additional","affiliation":[]},{"family":"Lu Zheng-ding","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TENCON.2001.949690","article-title":"Digital Watermarking Techniquefor Image Authentication by Neighboring Block Similarity Measure","author":"chotikakamthorn","year":"2001","journal-title":"Int Conf Electrical and Electronic Technology"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","article-title":"A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation","volume":"11","author":"lin","year":"2001","journal-title":"IEEE Trans Circuit System and Video Technology"},{"key":"ref10","first-page":"141","article-title":"SVM Based Waterknarking Technique","volume":"9","author":"yen","year":"2006","journal-title":"Tamkang Journal of Science and Engineering"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/EEE.2004.1287362","article-title":"Image Authentication Using Relation Measures of WaveletCoefficients","author":"tang","year":"2004","journal-title":"proc of the 2004 IEEE Int Conf on e-Technology e-Commerce ande-Service"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.1014990"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2002.1013058"},{"key":"ref12","first-page":"466","article-title":"SVR-Parameters Selection for Image Watermarking","author":"li","year":"2005","journal-title":"Proc of 17th IEEE Int Conf on Tools with Artificial Intelligence (ICTAI'05)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/el:20040600"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/el:20021059"},{"key":"ref9","first-page":"183","article-title":"An image watermarking technique based on support vector regression","volume":"1","author":"li","year":"2005","journal-title":"Proc IEEE International Symp Commun Inform Technol"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.821552"}],"event":{"name":"Multimedia and Expo, 2007 IEEE International Conference on","start":{"date-parts":[[2007,7,2]]},"location":"Beijing, China","end":{"date-parts":[[2007,7,5]]}},"container-title":["Multimedia and Expo, 2007 IEEE International Conference on"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4284552\/4284553\/04284885.pdf?arnumber=4284885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T18:24:13Z","timestamp":1497723853000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4284885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icme.2007.4284885","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}