{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T12:12:11Z","timestamp":1768997531264,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,26]]},"DOI":"10.1145\/1161366.1161399","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"182-189","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Image annotation watermarking"],"prefix":"10.1145","author":[{"given":"Claus","family":"Vielhauer","sequence":"first","affiliation":[{"name":"Otto-von-Guericke University, Magdeburg, Germany"}]},{"given":"Maik","family":"Schott","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke University, Magdeburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2006,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.465267"},{"key":"e_1_3_2_1_2_1","first-page":"53","volume-title":"In: Steinmetz, Ralf","author":"Dittmann J.","year":"2001","unstructured":"J. Dittmann , p. Wohlmacher, R. Ackermann: Conditional and User Specific Access to Services and Resources using Annotation Watermarks, In: Steinmetz, Ralf ; Dittmann, Jana; Steinebach, Martin (Eds.): Communications and Multimedia Security Issues of the New Century, Volume 192 , Kluver , ISBN 0-7923-7365-0, pp. 53 -- 65 , 2001 .]] J. Dittmann, p. Wohlmacher, R. Ackermann: Conditional and User Specific Access to Services and Resources using Annotation Watermarks, In: Steinmetz, Ralf; Dittmann, Jana; Steinebach, Martin (Eds.): Communications and Multimedia Security Issues of the New Century, Volume 192, Kluver , ISBN 0-7923-7365-0, pp. 53--65, 2001.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232471"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia","author":"Rytsar Y.","year":"2004","unstructured":"Y. Rytsar , S. Voloshynovskiy , F. Ehrler and Thierry Pun: Interactive segmentation with hidden object based annotations: towards smart media , In Proceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia , San Jose, USA , January 2004 .]] Y. Rytsar, S. Voloshynovskiy, F. Ehrler and Thierry Pun: Interactive segmentation with hidden object based annotations: towards smart media, In Proceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, January 2004.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/946250.946975"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.586977"},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/wordnet.princeton.edu\/","author":"WordNet - Princeton University Cognitive Science Laboratory","year":"2005","unstructured":"WordNet - Princeton University Cognitive Science Laboratory , http:\/\/wordnet.princeton.edu\/ , 2005 .]] WordNet - Princeton University Cognitive Science Laboratory, http:\/\/wordnet.princeton.edu\/, 2005.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","volume-title":"WordNet: An Electronic Lexical Database (Language, Speech and Communication)","author":"Fellbaum C.","year":"1998","unstructured":"C. Fellbaum : WordNet: An Electronic Lexical Database (Language, Speech and Communication) , MIT Press , ISBN 0-262-06197-X, 1998 .]] C. Fellbaum: WordNet: An Electronic Lexical Database (Language, Speech and Communication), MIT Press, ISBN 0-262-06197-X, 1998.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Methods for data hiding","author":"Fridrich J.","year":"1997","unstructured":"J. Fridrich : Methods for data hiding , Center for Intelligent Systems & Department of Systems Science and Industrial Engineering , SUNY Binghamton, 1997 .]] J. Fridrich: Methods for data hiding, Center for Intelligent Systems & Department of Systems Science and Industrial Engineering, SUNY Binghamton, 1997.]]"},{"key":"e_1_3_2_1_10_1","volume-title":"Anwendungsgebiete","author":"Dittmann J.","year":"2000","unstructured":"J. Dittmann : Digitale Wasserzeichen. Grundlagen, Verfahren , Anwendungsgebiete , Springer, Berlin , 2000 (in German).]] J. Dittmann: Digitale Wasserzeichen. Grundlagen, Verfahren, Anwendungsgebiete, Springer, Berlin, 2000 (in German).]]"}],"event":{"name":"MM&Sec '06: Multimedia and Security Workshop","location":"Geneva Switzerland","acronym":"MM&Sec '06","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 8th workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161366.1161399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T02:36:39Z","timestamp":1673058999000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161366.1161399"}},"subtitle":["nested object embedding using hypergraph model"],"short-title":[],"issued":{"date-parts":[[2006,9,26]]},"references-count":10,"alternative-id":["10.1145\/1161366.1161399","10.1145\/1161366"],"URL":"https:\/\/doi.org\/10.1145\/1161366.1161399","relation":{},"subject":[],"published":{"date-parts":[[2006,9,26]]},"assertion":[{"value":"2006-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}