{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:22Z","timestamp":1750308082888,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,8,1]],"date-time":"2005-08-01T00:00:00Z","timestamp":1122854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,8]]},"DOI":"10.1145\/1073170.1073190","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"103-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Robust non-interactive zero-knowledge watermarking scheme against cheating prover"],"prefix":"10.1145","author":[{"given":"Chia-Mu","family":"Yu","sequence":"first","affiliation":[{"name":"Academia Sinica, Taiwan, Republic of China"}]},{"given":"Chun-Shien","family":"Lu","sequence":"additional","affiliation":[{"name":"Academia Sinica, Taiwan, Republic of China"}]}],"member":"320","published-online":{"date-parts":[[2005,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"273","volume-title":"Int. Workshop on Information Hiding, LNCS 2137","author":"Adelsbach A.","year":"2001","unstructured":"A. Adelsbach and A. Sadeghi , \" Zero-Knowledge Watermark Detection and Proof of Ownership,\" Proc . Int. Workshop on Information Hiding, LNCS 2137 , pp. 273 -- 288 , 2001 . A. Adelsbach and A. Sadeghi, \"Zero-Knowledge Watermark Detection and Proof of Ownership,\" Proc. Int. Workshop on Information Hiding, LNCS 2137, pp. 273--288, 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0098-z"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022431.1022441"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22193"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668979"},{"key":"e_1_3_2_1_7_1","first-page":"107","volume-title":"Proc. Int. Workshop on Information Hiding, LNCS 1768","author":"Craver S.","year":"1999","unstructured":"S. Craver , \" Zero Knowledge Watermark Detection ,\" Proc. Int. Workshop on Information Hiding, LNCS 1768 , pp. 107 -- 122 , 1999 . S. Craver, \"Zero Knowledge Watermark Detection,\" Proc. Int. Workshop on Information Hiding, LNCS 1768, pp. 107--122, 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_1"},{"key":"e_1_3_2_1_9_1","volume-title":"Asymmetric Watermarking Schemes,\" Sicherheit in Netzen und Medienstromen","author":"Eggers J. J.","year":"2000","unstructured":"J. J. Eggers , J. K. Su , and B. Girod , \" Asymmetric Watermarking Schemes,\" Sicherheit in Netzen und Medienstromen , Springer Reihe , Infomatick Aktuell , 2000 . J. J. Eggers, J. K. Su, and B. Girod, \"Asymmetric Watermarking Schemes,\" Sicherheit in Netzen und Medienstromen, Springer Reihe, Infomatick Aktuell, 2000."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/800119.803884"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of EUSIPCO","author":"Hachez G.","year":"2002","unstructured":"G. Hachez and J-J. Quisquater , \" Which Directions for Asymmetric Watermarking?\" Proc. of EUSIPCO , France , 2002 . G. Hachez and J-J. Quisquater, \"Which Directions for Asymmetric Watermarking?\" Proc. of EUSIPCO, France, 2002."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/839285.841637"},{"key":"e_1_3_2_1_13_1","first-page":"5","article-title":"La cryptographie mililaire","volume":"9","author":"Kerckhoffs A.","year":"1883","unstructured":"A. Kerckhoffs , \" La cryptographie mililaire ,\" J. Sci. Militaires , Vol. 9 , pp. 5 -- 38 , 1883 . A. Kerckhoffs, \"La cryptographie mililaire,\" J. Sci. Militaires, Vol. 9, pp. 5--38, 1883.","journal-title":"J. Sci. Militaires"},{"key":"e_1_3_2_1_14_1","first-page":"61","volume-title":"2nd Int. Workshop on Digital Watermarking, LNCS 2939","author":"Lu C. S.","year":"2003","unstructured":"C. S. Lu and C.Y. Hsu , \" Content-Dependent Anti-Disclosure Image Watermark,\" Proc . 2nd Int. Workshop on Digital Watermarking, LNCS 2939 , pp. 61 -- 76 , Seoul, Korea , 2003 . C. S. Lu and C.Y. Hsu, \"Content-Dependent Anti-Disclosure Image Watermark,\" Proc. 2nd Int. Workshop on Digital Watermarking, LNCS 2939, pp. 61--76, Seoul, Korea, 2003."},{"key":"e_1_3_2_1_15_1","unstructured":"C. S. Lu S. W. Sun and P. C. Chang \"Robust Mesh-based Content-dependent Image Watermarking with Resistance to Both Geometric Attack and Watermark-Estimation Attack \" Proc. SPIE: Security Steganography and Watermarking of Multimedia Contents VII (EI120) pp. 147--163 San Jose California USA 2005. (The full version is available as a technical report (TR-IIS-05-002) at http:\/\/www.iis.sinica.edu.tw\/LIB\/TechReport\/tr2005\/threebone05.html)  C. S. Lu S. W. Sun and P. C. Chang \"Robust Mesh-based Content-dependent Image Watermarking with Resistance to Both Geometric Attack and Watermark-Estimation Attack \" Proc. SPIE: Security Steganography and Watermarking of Multimedia Contents VII (EI120) pp. 147--163 San Jose California USA 2005. (The full version is available as a technical report (TR-IIS-05-002) at http:\/\/www.iis.sinica.edu.tw\/LIB\/TechReport\/tr2005\/threebone05.html)"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE Int. Conf. on Multimedia and Expo","author":"Lu C. S.","year":"2005","unstructured":"C. S. Lu and C. M. Yu , \" On the Security of Mesh-based Media Hash-dependent Watermarking Against Protocol Attacks,\" Proc . IEEE Int. Conf. on Multimedia and Expo , The Netherlands , 2005 . C. S. Lu and C. M. Yu, \"On the Security of Mesh-based Media Hash-dependent Watermarking Against Protocol Attacks,\" Proc. IEEE Int. Conf. on Multimedia and Expo, The Netherlands, 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022431.1022448"},{"key":"e_1_3_2_1_18_1","first-page":"52","volume-title":"Non-Interactive Zero-Knowledge Proof Systems,\" Advances in Cryptology - CRYPTO '87 Proceedings","author":"Santis A. D.","year":"1987","unstructured":"A. D. Santis , S. Micali , and G. Persiano , \" Non-Interactive Zero-Knowledge Proof Systems,\" Advances in Cryptology - CRYPTO '87 Proceedings , pp. 52 -- 72 , 1987 . A. D. Santis, S. Micali, and G. Persiano, \"Non-Interactive Zero-Knowledge Proof Systems,\" Advances in Cryptology - CRYPTO '87 Proceedings, pp. 52--72, 1987."},{"key":"e_1_3_2_1_19_1","volume-title":"Protocols, Algorithms, and Source code in C","author":"Schneier B.","year":"1996","unstructured":"B. Schneier , \" Applied Cryptography : Protocols, Algorithms, and Source code in C ,\" 2 nd ed., John Wiley and Sons , 1996 . B. Schneier, \"Applied Cryptography: Protocols, Algorithms, and Source code in C,\" 2nd ed., John Wiley and Sons, 1996.","edition":"2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(01)00039-1"}],"event":{"name":"MM&Sec '05: Multimedia and Security Workshop 2005","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"],"location":"New York NY USA","acronym":"MM&Sec '05"},"container-title":["Proceedings of the 7th workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1073170.1073190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1073170.1073190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:45Z","timestamp":1750262865000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1073170.1073190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8]]},"references-count":20,"alternative-id":["10.1145\/1073170.1073190","10.1145\/1073170"],"URL":"https:\/\/doi.org\/10.1145\/1073170.1073190","relation":{},"subject":[],"published":{"date-parts":[[2005,8]]},"assertion":[{"value":"2005-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}