{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:29:35Z","timestamp":1694622575645},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Mag."],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1109\/msp.2004.1276116","type":"journal-article","created":{"date-parts":[[2004,3,23]],"date-time":"2004-03-23T19:01:11Z","timestamp":1080068471000},"page":"82-91","source":"Crossref","is-referenced-by-count":35,"title":["Digital rights management in consumer electronics products"],"prefix":"10.1109","volume":"21","author":[{"given":"W.","family":"Jonker","sequence":"first","affiliation":[]},{"given":"J.","family":"Linnartz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/OMODS.2002.1028548"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055868"},{"key":"ref33","first-page":"175","article-title":"A secure, robust watermark for multimedia","author":"cox","year":"1996","journal-title":"Proc Workshop Information Hiding"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"ref31","year":"0"},{"key":"ref30","year":"0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/49.668980"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/79.879338"},{"key":"ref35","article-title":"Reading between the lines: Lessons from the SDMI challenge","author":"craver","year":"2001","journal-title":"Proc 10th Usenix Security Symp"},{"key":"ref34","author":"cox","year":"2001","journal-title":"Digital Watermarking Principles & Practice"},{"key":"ref28","year":"0","journal-title":"5C Digital Transmission Content Protect White Paper"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022878024170"},{"key":"ref29","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/35.790866"},{"key":"ref1","first-page":"20","article-title":"Special report: Copy protection","volume":"40","year":"2003","journal-title":"IEEE Spectr"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/5.771077"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2003.1218954"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/6.795605"},{"key":"ref24","year":"0"},{"key":"ref23","year":"0"},{"key":"ref26","year":"0"},{"key":"ref25","year":"0"},{"key":"ref50","first-page":"467","author":"van den heuvel","year":"2002","journal-title":"Int Broadcasting Conv Secure Content Management in Authorised Domains (IBC2002)"},{"key":"ref51","author":"iannella","year":"2001","journal-title":"Open Digital Rights Language (ORDL) version 1 0"},{"key":"ref55","year":"2001","journal-title":"IBM response to DVB-CPT cfp for content protection and copy management xCP cluster Protocol"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023789"},{"key":"ref53","year":"0"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WDM.2003.1233885"},{"key":"ref10","year":"0","journal-title":"Digital Millennium Copyright Act (DMCA)"},{"key":"ref11","year":"0"},{"key":"ref40","author":"schneier","year":"1997","journal-title":"Applied Cryptography"},{"key":"ref12","first-page":"198","article-title":"Technical protection measures: The intersection of technology, law and commercial licenses","author":"marks","year":"2000","journal-title":"European Int Prop Rev"},{"key":"ref13","year":"0"},{"key":"ref14","year":"0"},{"key":"ref15","year":"0"},{"key":"ref16","year":"0"},{"key":"ref17","year":"0"},{"key":"ref18","year":"0","journal-title":"Copy Protection Technical Working Group"},{"key":"ref19","year":"0"},{"key":"ref4","year":"0"},{"key":"ref3","author":"goroch","year":"2002","journal-title":"Digital Tech Consulting"},{"key":"ref6","year":"0"},{"key":"ref5","year":"0"},{"key":"ref8","year":"0"},{"key":"ref7","year":"0"},{"key":"ref49","year":"0"},{"key":"ref9","year":"0","journal-title":"XrML?The Technology Standard for Trusted Systems in the eContentMarketplace"},{"key":"ref46","year":"0"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/3-540-45925-1_11","volume":"2314","author":"oostveen","year":"0","journal-title":"Recent Advances in Visual Information Systems"},{"key":"ref48","year":"0"},{"key":"ref47","year":"0"},{"key":"ref42","first-page":"1","article-title":"AudioID: Towards content-based identification of audio material","author":"allamanche","year":"2001","journal-title":"Procs of the 100th AES Convention"},{"key":"ref41","author":"menez","year":"1997","journal-title":"Handbook of Applied Cryptography"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1076\/jnmr.32.2.211.16746"},{"key":"ref43","article-title":"Robust sound modelling for song detection in broadcast audio","author":"cano","year":"2002","journal-title":"Proc AES 112th Int Conv"}],"container-title":["IEEE Signal Processing Magazine"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/79\/28554\/01276116.pdf?arnumber=1276116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:21:36Z","timestamp":1642004496000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,3]]}},"URL":"https:\/\/doi.org\/10.1109\/msp.2004.1276116","relation":{},"ISSN":["1053-5888"],"issn-type":[{"value":"1053-5888","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}