{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:01:09Z","timestamp":1760346069534},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2009,5,1]],"date-time":"2009-05-01T00:00:00Z","timestamp":1241136000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/tip.2009.2014807","type":"journal-article","created":{"date-parts":[[2009,3,24]],"date-time":"2009-03-24T19:40:29Z","timestamp":1237923629000},"page":"1055-1068","source":"Crossref","is-referenced-by-count":72,"title":["RST Invariant Image Watermarking Algorithm With Mathematical Modeling and Analysis of the Watermarking Processes"],"prefix":"10.1109","volume":"18","author":[{"family":"Dong Zheng","sequence":"first","affiliation":[]},{"family":"Sha Wang","sequence":"additional","affiliation":[]},{"family":"Jiying Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4285096"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899229"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1117\/1.1494075"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.804091"},{"key":"ref15","first-page":"23","article-title":"dct-domain image watermarking and generalized gaussian models","author":"hernandez","year":"1998","journal-title":"Proc COST No 254 Int Workshop on Intelligent Communications and Multimedia Terminals"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/83.277898"},{"key":"ref17","first-page":"212","article-title":"a stochastic approach to content adaptive digital image watermarking","author":"voloshynovskiy","year":"1999","journal-title":"Proc Int Workshop on Information Hiding"},{"key":"ref18","author":"blahut","year":"1987","journal-title":"Principles and Practice of Information Theory"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1117\/12.527745","article-title":"steganalysis of block-structured stegotext","volume":"5306","author":"wang","year":"2004","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/3-540-45496-9_25","article-title":"second generation benchmarking and application oriented evaluation","author":"pereira","year":"2001","journal-title":"Proc 4th Int Information Hiding Workshop"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/83.846253"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/83.918569"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1117\/12.435423","article-title":"the watermark template attack","volume":"4314","author":"herrigel","year":"2001","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents III"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.823831"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/36.789634"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1242471.1242473"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809367"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1855","DOI":"10.1109\/78.403344","article-title":"adaptive robust impulse noise filtering","volume":"43","author":"kim","year":"1995","journal-title":"IEEE Trans Signal Process"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/83.817598"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.837516"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/83\/4808398\/04804680.pdf?arnumber=4804680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:44:13Z","timestamp":1633913053000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4804680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":22,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tip.2009.2014807","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5]]}}}