{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T08:16:23Z","timestamp":1648887383083},"reference-count":25,"publisher":"SPIE-Intl Soc Optical Eng","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Electron. Imaging"],"published-print":{"date-parts":[[2008,7,1]]},"DOI":"10.1117\/1.2954128","type":"journal-article","created":{"date-parts":[[2008,8,28]],"date-time":"2008-08-28T06:14:36Z","timestamp":1219904076000},"page":"033009","source":"Crossref","is-referenced-by-count":2,"title":["New watermarking algorithm with data authentication and reduction for JPEG image"],"prefix":"10.1117","volume":"17","author":[{"given":"Chuen-Ching","family":"Wang","sequence":"first","affiliation":[]}],"member":"189","reference":[{"key":"10.1117\/1.2954128_r1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.808816"},{"key":"10.1117\/1.2954128_r2","doi-asserted-by":"publisher","DOI":"10.1109\/30.267415"},{"key":"10.1117\/1.2954128_r3","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20045062"},{"key":"10.1117\/1.2954128_r4","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"10.1117\/1.2954128_r5","doi-asserted-by":"publisher","DOI":"10.1109\/83.951543"},{"key":"10.1117\/1.2954128_r6","unstructured":"M. M. Yeung and F. Mintzer , \u201cAn invisible watermarking technique for image verification,\u201dProc. 1997 Intl. Conf. on Image Processing, Vol. 2, pp. 680\u2013683 (1997)."},{"key":"10.1117\/1.2954128_r7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809381"},{"key":"10.1117\/1.2954128_r8","doi-asserted-by":"publisher","DOI":"10.1109\/83.951542"},{"key":"10.1117\/1.2954128_r9","unstructured":"M. Wu and B. Liu , \u201cWatermarking for image authentication,\u201dIntl. Conf. on Image Processing, Vol. 2, pp. 1\u201310 (1998)."},{"key":"10.1117\/1.2954128_r10","doi-asserted-by":"crossref","unstructured":"I. Cox, J. Bloom, and M. Miller ,Digital Watermarking, Morgan Kauffmann Publishers, (2002).","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"10.1117\/1.2954128_r11","doi-asserted-by":"publisher","DOI":"10.1049\/el:20030619"},{"key":"10.1117\/1.2954128_r12","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20040812"},{"key":"10.1117\/1.2954128_r13","unstructured":"J. Fridrich, M. Goljan, and R. Du , \u201cInvertible authentication watermark for JPEG images,\u201dIEEE Intl. Conf Information Technology: Coding and Computing, pp. 223\u2013227 (2001)."},{"key":"10.1117\/1.2954128_r14","first-page":"2024","volume":"1","author":"Kallel","year":"2006","journal-title":"Inf. Commun. Technol."},{"key":"10.1117\/1.2954128_r15","unstructured":"H. M. Liu, J. F. Liu, J. W. Huang, D. R. Huang, and Y. Q. Shi , \u201cA robust DWT-based blind data hiding algorithm,\u201dIEEE Intl. Symp. on Circuits and Systems, Vol. 2, pp. II-672\u2013II-675 (2002)."},{"key":"10.1117\/1.2954128_r16","doi-asserted-by":"crossref","unstructured":"H. Inoue, A. Miyazaki, and T. Katsura , \u201cWavelet-based watermarking for tamper proofing of still images,\u201dProc. Intl. Symp. on Image Processing, Vol. 2, pp. 88\u201391 (2000).","DOI":"10.1109\/ICIP.2000.899234"},{"key":"10.1117\/1.2954128_r17","first-page":"187","volume":"1","author":"Chang","year":"2007","journal-title":"Int. J. Comput Sci. Eng. Syst."},{"key":"10.1117\/1.2954128_r18","doi-asserted-by":"crossref","first-page":"xviii","DOI":"10.1109\/30.125072","volume":"38","author":"Wallace","year":"1992","journal-title":"IEEE Trans. Consum. Electron.","ISSN":"http:\/\/id.crossref.org\/issn\/0098-3063","issn-type":"print"},{"key":"10.1117\/1.2954128_r19","unstructured":"ISO\/IEC 11 172-2, \u201cInformation technology\u2014Coding of moving pictures and associated audio for digital storage media at up to about 1.5\u2002Mbit\u2215s\u2014Part 2: Video\u201d (1993)."},{"key":"10.1117\/1.2954128_r20","unstructured":"ISO\/IEC 14496-2, \u201cCoding of Audio-Visual Objects, Part-2 Visual\u201d (2001)."},{"key":"10.1117\/1.2954128_r21","unstructured":"ISO\/IEC 14496-2:2001\/Amd. 2, \u201cCoding of Audio-Visual Objects, Part-2 Visual, Streaming Video Profile\u201d (2002)."},{"key":"10.1117\/1.2954128_r22","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MMUL.2006.93","volume":"13","author":"Kalva","year":"2006","journal-title":"IEEE Trans. Multimedia","ISSN":"http:\/\/id.crossref.org\/issn\/1520-9210","issn-type":"print"},{"key":"10.1117\/1.2954128_r23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815165"},{"key":"10.1117\/1.2954128_r24","unstructured":"ISO\/IEC 14496-10, \u201cInformation Technology\u2014Coding of Audio-Visual Objects, Part 10: Advanced Video Coding\u201d (2003)."},{"key":"10.1117\/1.2954128_r25","doi-asserted-by":"crossref","unstructured":"R. L. Rivest , \u201cThe MD5 message digest algorithm,\u201d Tech. Report (1992).","DOI":"10.17487\/rfc1321"}],"container-title":["Journal of Electronic Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?articleid=1100109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T17:01:42Z","timestamp":1557766902000},"score":1,"resource":{"primary":{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?doi=10.1117\/1.2954128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,1]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,7,1]]}},"URL":"https:\/\/doi.org\/10.1117\/1.2954128","relation":{},"ISSN":["1017-9909"],"issn-type":[{"value":"1017-9909","type":"print"}],"subject":[],"published":{"date-parts":[[2008,7,1]]}}}