{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:59:55Z","timestamp":1725429595608},"reference-count":14,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itcc.2003.1197588","type":"proceedings-article","created":{"date-parts":[[2004,5,13]],"date-time":"2004-05-13T10:43:37Z","timestamp":1084445017000},"page":"548-553","source":"Crossref","is-referenced-by-count":0,"title":["Joint ownership verification for an image using digital watermarking"],"prefix":"10.1109","author":[{"family":"Huiping Guo","sequence":"first","affiliation":[]},{"given":"N.D.","family":"Georganas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/49.668975"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/6046.944472"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/500141.500189"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref14","article-title":"Content adaptive watermarking based on a stochastic multiresolution image modeling","author":"voloshynovskiy","year":"0","journal-title":"Tenth European Signal Processing Conference"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/6046.890056"},{"journal-title":"Digital Watermarking","year":"2001","author":"cox","key":"ref3"},{"key":"ref6","first-page":"219","article-title":"Attacks on copyright marking systems","author":"petitcolas","year":"0","journal-title":"International Workshop in Information Hiding"},{"journal-title":"Cryptography Theory and Practice","year":"1995","author":"stinson","key":"ref5"},{"key":"ref8","first-page":"99","article-title":"Secret sharing scheme realizing general access structure","author":"ito","year":"1987","journal-title":"Proc IEEE Global Telecomm Conf GLOBECOM"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/641007.641085"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1117\/12.344684","article-title":"Dither modulation: a new approach to digital watermarking and information embedding","author":"chen","year":"1999","journal-title":"Proc of SPIE Int Conf On Security and Watermarking Contents"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/79.879339"}],"event":{"name":"ITCC 2003. International Conference on Information Technology: Coding and Computing","acronym":"ITCC-03","location":"Las Vegas, NV, USA"},"container-title":["Proceedings ITCC 2003. International Conference on Information Technology: Coding and Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8532\/26947\/01197588.pdf?arnumber=1197588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:02:03Z","timestamp":1497582123000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1197588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/itcc.2003.1197588","relation":{},"subject":[]}}