{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:12:49Z","timestamp":1729660369069,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscisc.2016.7736445","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T16:27:30Z","timestamp":1478536050000},"page":"13-19","source":"Crossref","is-referenced-by-count":0,"title":["Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique"],"prefix":"10.1109","author":[{"given":"Samira","family":"Hosseini","sequence":"first","affiliation":[]},{"given":"Mojtaba","family":"Mahdavi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/83.826780"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/1.1459449"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.638587"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.06.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.02.007"},{"article-title":"Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack","year":"0","author":"kourkchi","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2004.836745"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2523530"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.11.023"},{"key":"ref4","first-page":"165","article-title":"A survey of digital watermarking techniques, applications and attacks","volume":"2","author":"singh","year":"2013","journal-title":"International Journal of Engineering and Innovative Technology (IJEIT)"},{"journal-title":"Digital Watermarking and Steganography","year":"2008","author":"cox","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2012.6271316"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.05.006"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1117\/12.465330","article-title":"Security of fragile authentication watermarks with localization","author":"fridrich","year":"2002","journal-title":"Electronic Imaging 2002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865702204047"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.12.017"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.10.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/721-1013"}],"event":{"name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2016,9,7]]},"location":"Tehran","end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7604981\/7736436\/07736445.pdf?arnumber=7736445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T06:29:39Z","timestamp":1568528979000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7736445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2016.7736445","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}