{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:41:33Z","timestamp":1729669293753,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/ithet.2012.6246008","type":"proceedings-article","created":{"date-parts":[[2012,7,31]],"date-time":"2012-07-31T21:50:46Z","timestamp":1343771446000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A watermarking system for teaching intellectual property rights: Implementation and performance"],"prefix":"10.1109","author":[{"given":"Maria","family":"Chroni","sequence":"first","affiliation":[]},{"given":"Angelos","family":"Fylakis","sequence":"additional","affiliation":[]},{"given":"Stavros D.","family":"Nikolopoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"155","article-title":"A Technique for the Measurement of Attitudes","volume":"140","author":"likert","year":"1932","journal-title":"Archives of Psychology"},{"journal-title":"Teaching in Schools Theory and Practice","year":"2009","author":"kyriacou","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.582602"},{"journal-title":"Models of Teaching","year":"2000","author":"joyce","key":"15"},{"key":"16","first-page":"126","article-title":"A Study of Digital Image Watermarking","volume":"2","author":"kaur","year":"2012","journal-title":"Int Journal of Research in Education and Applied Sciences"},{"journal-title":"The Protection of Computer Software Its Technology and Applications","year":"1997","author":"grover","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PICMET.2009.5261930"},{"journal-title":"Algorithmic Graph Theory and Perfect Graphs","year":"1980","author":"golumbic","key":"11"},{"journal-title":"Digital Image Processing","year":"2007","author":"gonzalez","key":"12"},{"key":"21","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1152\/advances.1996.270.6.S69","article-title":"Preparing students to participate in an active learning environment","volume":"15","author":"modell","year":"1996","journal-title":"Adv Physiol Educ"},{"journal-title":"The New Taxonomy of Educational Objectives","year":"2007","author":"marzano","key":"20"},{"key":"22","article-title":"Intellectual Property Licensing: Forms and Analysis","author":"raysman","year":"1999","journal-title":"Law Journal Press"},{"journal-title":"An Introduction to the Analysis of Algorithms","year":"1996","author":"sedgewick","key":"23"},{"key":"24","first-page":"53","article-title":"What is the value of course-specific learning goals?","author":"simon","year":"2009","journal-title":"Journal of College Science Teaching"},{"journal-title":"Software Engineering","year":"2010","author":"sommerville","key":"25"},{"key":"26","first-page":"569","article-title":"Design and evaluation of birthmarks for detecting theft of Java programs","author":"tamada","year":"2004","journal-title":"Proceedings of the Conference on Software Engineering (SE'04)"},{"journal-title":"Software Architecture Foundations Theory and Practice","year":"2009","author":"taylor","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.4135\/9781446211472"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.2307\/2026548"},{"key":"3","article-title":"A Watermarking System for Teaching Students to Respect Intellectual Property Rights","author":"chroni","year":"0","journal-title":"4th Int'l Conference on Computer Supported Education (CSEDU'12) 2012"},{"journal-title":"A Taxonomy for Learning Teaching and Assessing A Revision of Bloom's Taxonomy of Educational Objectives","year":"2001","author":"anderson","key":"2"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1995","author":"gamma","key":"10"},{"key":"1","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/T-C.1974.223784","article-title":"Discrete cosine transform","volume":"c 23","author":"ahmed","year":"1974","journal-title":"IEEE Transactions on Computers"},{"key":"7","first-page":"317","article-title":"A secure, robust watermark for multimedia","volume":"1174","author":"cox","year":"1996","journal-title":"LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"journal-title":"Surreptitious Software","year":"2010","author":"collberg","key":"5"},{"key":"4","article-title":"Watermarking Images using 2D Representations of Self-inverting Permutations","author":"chroni","year":"0","journal-title":"8th Int'l Conf on Web Information Systems and Technologies (WEBIST'12) 2012"},{"journal-title":"Classroom Management for Secondary Teachers","year":"2002","author":"emmer","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.1997.658863"}],"event":{"name":"2012 11th International Conference on Information Technology Based Higher Education and Training (ITHET)","start":{"date-parts":[[2012,6,21]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2012,6,23]]}},"container-title":["2012 International Conference on Information Technology Based Higher Education and Training (ITHET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6238099\/6245999\/06246008.pdf?arnumber=6246008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T09:56:07Z","timestamp":1562061367000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6246008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ithet.2012.6246008","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}