{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:48:01Z","timestamp":1729615681708,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscas.2003.1206128","type":"proceedings-article","created":{"date-parts":[[2003,10,15]],"date-time":"2003-10-15T12:46:31Z","timestamp":1066221991000},"page":"II-932-II-935","source":"Crossref","is-referenced-by-count":1,"title":["Geometric moment in image watermarking"],"prefix":"10.1109","volume":"2","author":[{"family":"Zhang Li","sequence":"first","affiliation":[]},{"family":"Sam Kwong","sequence":"additional","affiliation":[]},{"family":"Gang Wei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/83.846253"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1117\/12.385011","article-title":"Geometric distortions correction in image watermarking","volume":"3971","author":"alghoniemy","year":"2000","journal-title":"Proc SPIE Security Watermarking Multimedia Contents II"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1117\/12.337432","article-title":"Watermarking resisting to translation, rotation and scaling","volume":"3528","author":"kutter","year":"1998","journal-title":"Proc of SPIE Multimedia Systems and Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899229"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/83.941859"},{"key":"ref16","first-page":"1428","article-title":"Patter recognition by moment invariants","volume":"49","author":"hu","year":"1961","journal-title":"Proceedings of IRE"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"hsu","year":"1999","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref3","article-title":"Generalized watermarking attack based on watermark estimation and perceptual remodulation","author":"voloshynovski","year":"2000","journal-title":"IS&T\/SPIE's 12th Annual Symposium Electronic Imaging 2000 Security and watermarking of multimedia content II Vol 3971 of SPIE Proceedings"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/83.918569"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723388"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00016-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.385012"},{"key":"ref2","first-page":"2","article-title":"Attacks on Digital Watermarks: Classification, Estimation-based attacks and benchmarks","author":"sviatolsav","year":"2001","journal-title":"IEEE Communications Magazine"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1117\/12.384988"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.647968"}],"event":{"name":"ISCAS 2003. International Symposium on Circuits and Systems","acronym":"ISCAS-03","location":"Bangkok, Thailand"},"container-title":["Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8570\/27136\/01206128.pdf?arnumber=1206128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T21:22:42Z","timestamp":1497561762000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1206128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscas.2003.1206128","relation":{},"subject":[]}}