{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:12:48Z","timestamp":1771467168317,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Mag."],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1109\/msp.2004.1276112","type":"journal-article","created":{"date-parts":[[2004,3,23]],"date-time":"2004-03-23T19:01:11Z","timestamp":1080068471000},"page":"40-49","source":"Crossref","is-referenced-by-count":140,"title":["When seeing isn't believing"],"prefix":"10.1109","volume":"21","author":[{"given":"B.B.","family":"Zhu","sequence":"first","affiliation":[]},{"given":"M.D.","family":"Swanson","sequence":"additional","affiliation":[]},{"given":"A.H.","family":"Tewfik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"1009","article-title":"Speech content authentication integrated with CELP speech coders","author":"wu","year":"2001","journal-title":"Proc IEEE Conf on Multimedia and Expo (ICME"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958287"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1117\/12.384968","article-title":"Semi-fragile watermarking for authenticating JPEG visual content","author":"lin","year":"2000","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents II"},{"key":"ref30","first-page":"22","article-title":"A quantitative semi-fragile JPEG2000 image authentication system","volume":"2","author":"sun","year":"2002","journal-title":"Proc IEEE Int Conf Image Processing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/83.951543"},{"key":"ref11","first-page":"79","article-title":"Fragile imperceptible digital watermark with privacy control","volume":"3657","author":"coppersmith","year":"1999","journal-title":"Proc SPIE\/IS&T Symp Electronic Imaging Science and Technology"},{"key":"ref12","first-page":"502","article-title":"A hierarchical image authentication watermark with improved localization and security","volume":"2","author":"celik","year":"2001","journal-title":"Proc IEEE Int Conf Image Processing"},{"key":"ref13","year":"2001","journal-title":"Lossless recovery of an original image containing embedded data"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1117\/12.435400","article-title":"Invertible authentication","volume":"3971","author":"fridrich","year":"2001","journal-title":"Proc SPIE Security Watermarking of Multimedia Contents"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1155\/S1110865702000537","article-title":"Lossless data embedding?New paradigm in digital watermarking","volume":"2002","author":"fridrich","year":"2002","journal-title":"EURASIP J Applied Signal Processing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSPWS.1996.555456"},{"key":"ref18","author":"zhu","year":"1998","journal-title":"Coding and Data Hiding for Multimedia"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/5.771070"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/76.905982"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.638587"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723518"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/83.826780"},{"key":"ref6","first-page":"428","article-title":"Further attacks on Yeung-Mintzer fragile watermarking scheme","author":"fridrich","year":"2000","journal-title":"Proc SPIE Photonic West Electronic Imaging 2000 Security and Watermarking of Multimedia Contents"},{"key":"ref29","article-title":"Generating robust digital signature for image\/video authentication","author":"lin","year":"1998","journal-title":"Multimedia and Security Workshop at ACM Multimedia 98"},{"key":"ref5","first-page":"301","article-title":"On the security of the yeung -mintzer authentication watermark","author":"memon","year":"1999","journal-title":"Proc IS&T's PICS"},{"key":"ref8","first-page":"691","article-title":"Security of fragile authentication watermarks with localization","author":"fridrich","year":"2002","journal-title":"Proc SPIE Photonic West vol 4675 Electronic Imaging 2002 Security and Watermarking of Multimedia Contents"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.900991"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/978-3-662-05300-3_7","author":"zhu","year":"2003","journal-title":"Multimedia Information Retrieval and Management"},{"key":"ref9","first-page":"18","article-title":"Information authentication for a slippery new age","volume":"20","author":"walton","year":"1995","journal-title":"Dr Dobbs J"},{"key":"ref1","author":"stinson","year":"1995","journal-title":"Cryptography Theory and Practice"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1117\/12.384970","article-title":"Distortion bounded authentication techniques","volume":"3971","author":"memon","year":"2000","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents II"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560425"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2002.802018"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1117\/12.344706","article-title":"Content-based integrity protection of digital images","volume":"3657","author":"queluz","year":"1999","journal-title":"Proc SPIE Conf Security Watermarking Multimedia Contents"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/30.826378"},{"key":"ref26","first-page":"694","article-title":"Image authentication and integrity verification via content-based watermarks and a public key cryptosystem","volume":"3","author":"li","year":"2000","journal-title":"Proc IEEE Int Conf Image Processing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.778274"}],"container-title":["IEEE Signal Processing Magazine"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/79\/28554\/01276112.pdf?arnumber=1276112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:21:36Z","timestamp":1642004496000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,3]]}},"URL":"https:\/\/doi.org\/10.1109\/msp.2004.1276112","relation":{},"ISSN":["1053-5888"],"issn-type":[{"value":"1053-5888","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}