{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:24:31Z","timestamp":1725456271661},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itcc.2003.1197591","type":"proceedings-article","created":{"date-parts":[[2004,5,13]],"date-time":"2004-05-13T10:43:37Z","timestamp":1084445017000},"page":"564-568","source":"Crossref","is-referenced-by-count":0,"title":["Correlation-based asymmetric watermark detector"],"prefix":"10.1109","author":[{"family":"Tae Young Kim","sequence":"first","affiliation":[]},{"family":"Taejeong Kim","sequence":"additional","affiliation":[]},{"family":"Hyuk Choi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.647966"},{"key":"ref3","first-page":"107","article-title":"Asymmetric watermarking schemes","author":"eggers","year":"2000","journal-title":"Tagungsband des GI Workshops &#x201C;Sicherheit in Mediendaten"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723517"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.779265"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/el:20010029"},{"key":"ref5","first-page":"77","article-title":"Developments in steganography","author":"smith","year":"1999","journal-title":"Proc Third Int Workshop Inform Hiding"},{"journal-title":"Statistical Digital Signal Processing and Modeling","year":"1996","author":"hayes","key":"ref12"},{"key":"ref8","first-page":"290","article-title":"On the Public Key Watermarking Issue","author":"picard","year":"2001","journal-title":"Proc of SPIE Vol 4314 Security and Watermarking Multimedia Contents II"},{"key":"ref7","article-title":"Public key watermarking by eigenvectors of linear transforms","author":"eggers","year":"2000","journal-title":"Proc of European Signal Processing Conf"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/3-540-49380-8_18","article-title":"Analysis of the sensitivity attack against electronic watermarks in images","author":"linnartz","year":"1998","journal-title":"Information Hiding Workshop"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899271"},{"journal-title":"Digital Watermarking","year":"2001","author":"cox","key":"ref1"}],"event":{"name":"ITCC 2003. International Conference on Information Technology: Coding and Computing","acronym":"ITCC-03","location":"Las Vegas, NV, USA"},"container-title":["Proceedings ITCC 2003. International Conference on Information Technology: Coding and Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8532\/26947\/01197591.pdf?arnumber=1197591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:02:03Z","timestamp":1497582123000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1197591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/itcc.2003.1197591","relation":{},"subject":[]}}