{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:06:41Z","timestamp":1761930401804,"version":"build-2065373602"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icpr.2002.1048474","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T23:36:53Z","timestamp":1056584213000},"page":"1001-1004","source":"Crossref","is-referenced-by-count":3,"title":["Block DCT-based robust watermarking using side information extracted by mean filtering"],"prefix":"10.1109","volume":"2","author":[{"family":"Chun-Shien Lu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Watermarking resistant to translation, rotation, and scaling","author":"kutter","year":"1998","journal-title":"Proc SPIE Int Symp on Voice Video and Data Communication"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/78.950793"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771068"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1117\/12.384990","article-title":"Generalized watermarking attack based on watermark estimation and perceptual remodulation","volume":"3971","author":"voloshynovskiy","year":"2000","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents II"},{"key":"7","first-page":"279","article-title":"Denoising and copy attacks resilient watermarking by exploiting knowledge at detector","volume":"11","author":"lu","year":"2002","journal-title":"IEEE Trans on Image Processing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/83.951542"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/6046.890056"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1117\/12.384991","article-title":"The watermark copy attack","volume":"3971","author":"kutter","year":"2000","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents II"},{"key":"9","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","article-title":"Attacks on copyright marking systems","author":"petitcolas","year":"1998","journal-title":"Second Workshop on Information Hiding"},{"key":"8","first-page":"146","article-title":"Computing the probability of false watermark detection","author":"miller","year":"1999","journal-title":"Information Hiding 1st Int Workshop"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1117\/12.435452","article-title":"Optimal adaptive diversity watermarking with channel state estimation","volume":"4314","author":"voloshynovskiy","year":"2001","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(01)00039-1"}],"event":{"name":"16th International Conference on Pattern Recognition","acronym":"ICPR-02","location":"Quebec City, Que., Canada"},"container-title":["Object recognition supported by user interaction for service robots"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8091\/22464\/01048474.pdf?arnumber=1048474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:44:43Z","timestamp":1497566683000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1048474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icpr.2002.1048474","relation":{},"subject":[]}}