{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:58Z","timestamp":1750307698901,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T00:00:00Z","timestamp":1243987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,3]]},"DOI":"10.1145\/1551722.1551731","type":"proceedings-article","created":{"date-parts":[[2009,6,9]],"date-time":"2009-06-09T12:44:24Z","timestamp":1244551464000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security in collaborative multimedia art communities"],"prefix":"10.1145","author":[{"given":"Dimitrios","family":"Koukopoulos","sequence":"first","affiliation":[{"name":"University of Ioannina, Greece"}]},{"given":"Georgios D.","family":"Styliaras","sequence":"additional","affiliation":[{"name":"University of Ioannina, Greece"}]}],"member":"320","published-online":{"date-parts":[[2009,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180367.1180379"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314418.1314435"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the 8th Panhellenic Conference on Informatics","author":"Armeni S.","year":"2001","unstructured":"Armeni , S. , Christodoulakis , D. , Kostopoulos , I. , Stamatiou , Y. C. and Xenos , M . 2001. Proving copyright ownership using hard instances of computationally intractable problems . In Proc. of the 8th Panhellenic Conference on Informatics , Nicosia, Cyprus , November 2001 , 22--23. Armeni, S., Christodoulakis, D., Kostopoulos, I., Stamatiou, Y. C. and Xenos, M. 2001. Proving copyright ownership using hard instances of computationally intractable problems. In Proc. of the 8th Panhellenic Conference on Informatics, Nicosia, Cyprus, November 2001, 22--23."},{"key":"e_1_3_2_1_4_1","first-page":"331","article-title":"Where the really hard problems are","volume":"1","author":"Cheeseman P.","year":"1991","unstructured":"Cheeseman , P. , Kanefsky , B. and Taylor , W. 1991 . Where the really hard problems are ? Int. Joint Conference on Artificial Intelligence , Vol. 1 , 331 -- 337 . Cheeseman, P., Kanefsky, B. and Taylor, W. 1991. Where the really hard problems are? Int. Joint Conference on Artificial Intelligence, Vol. 1, 331--337.","journal-title":"Int. Joint Conference on Artificial Intelligence"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027631"},{"key":"e_1_3_2_1_6_1","volume-title":"The Library of Congress","author":"Coyle K.","year":"2004","unstructured":"Coyle , K. 2004 . Rights expression languages. Technical report , The Library of Congress , Feb. 2004. Available at www.loc.gov\/standards\/relreport.pdf. Coyle, K. 2004. Rights expression languages. Technical report, The Library of Congress, Feb. 2004. Available at www.loc.gov\/standards\/relreport.pdf."},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE Int. Symp. on Circuits and Systems, May 23--26","author":"Foo S. W.","year":"2005","unstructured":"Foo , S. W. , Xue , F. and Li , M . 2005. A blind audio watermarking scheme using peak point extraction . IEEE Int. Symp. on Circuits and Systems, May 23--26 2005 , 4409--4412. Foo, S. W., Xue, F. and Li, M. 2005. A blind audio watermarking scheme using peak point extraction. IEEE Int. Symp. on Circuits and Systems, May 23--26 2005, 4409--4412."},{"key":"#cr-split#-e_1_3_2_1_8_1.1","doi-asserted-by":"crossref","unstructured":"Garc\u00eda R. and Gil R. 2009. Content value chains modelling using a copyright ontology Press Information Systems doi:10.1016\/j.is.2008.12.001. 10.1016\/j.is.2008.12.001","DOI":"10.1016\/j.is.2008.12.001"},{"key":"#cr-split#-e_1_3_2_1_8_1.2","doi-asserted-by":"crossref","unstructured":"Garc\u00eda R. and Gil R. 2009. Content value chains modelling using a copyright ontology Press Information Systems doi:10.1016\/j.is.2008.12.001.","DOI":"10.1016\/j.is.2008.12.001"},{"key":"e_1_3_2_1_9_1","unstructured":"Garey M. and Johnson D. 1979. Computers and Intractability a guide to the theory of NP-completeness. W. H. Freeman and Company.   Garey M. and Johnson D. 1979. Computers and Intractability a guide to the theory of NP-completeness. W. H. Freeman and Company ."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00011-5"},{"issue":"2","key":"e_1_3_2_1_11_1","first-page":"119","article-title":"Image watermark using visual model based discrete wavelet transform","volume":"1","author":"Jin C.","year":"2007","unstructured":"Jin , C. , Pan , L. and Su , T. 2007 . Image watermark using visual model based discrete wavelet transform . International Journal of Computer Sciences and Engineering Systems , vol. 1 , no. 2 , 119 -- 124 . Jin, C., Pan, L. and Su, T. 2007. Image watermark using visual model based discrete wavelet transform. International Journal of Computer Sciences and Engineering Systems, vol. 1, no. 2, 119--124.","journal-title":"International Journal of Computer Sciences and Engineering Systems"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00799-004-0080-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232459"},{"issue":"3","key":"e_1_3_2_1_14_1","first-page":"206","article-title":"A Watermarking Scheme for MP3 Audio Files","volume":"2","author":"Koukopoulos D.","year":"2005","unstructured":"Koukopoulos , D. and Stamatiou , Y. 2005 . A Watermarking Scheme for MP3 Audio Files . International Journal of Signal Processing , Vol. 2 , No. 3 , 206 -- 213 . Koukopoulos, D. and Stamatiou, Y. 2005. A Watermarking Scheme for MP3 Audio Files. International Journal of Signal Processing, Vol. 2, No. 3, 206--213.","journal-title":"International Journal of Signal Processing"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-006-0096-1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232473"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815948"}],"event":{"name":"EATIS '09: Euro American Conference on Telematics and Information Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGMM ACM Special Interest Group on Multimedia"],"location":"Prague Czech Republic","acronym":"EATIS '09"},"container-title":["Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1551722.1551731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1551722.1551731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:00Z","timestamp":1750253400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1551722.1551731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,3]]},"references-count":18,"alternative-id":["10.1145\/1551722.1551731","10.1145\/1551722"],"URL":"https:\/\/doi.org\/10.1145\/1551722.1551731","relation":{},"subject":[],"published":{"date-parts":[[2009,6,3]]},"assertion":[{"value":"2009-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}