{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:55Z","timestamp":1750308775941,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,11]],"date-time":"2014-06-11T00:00:00Z","timestamp":1402444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,11]]},"DOI":"10.1145\/2600918.2600939","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"41-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks"],"prefix":"10.1145","author":[{"given":"Erwin","family":"Quiring","sequence":"first","affiliation":[{"name":"University of M\u00fcnster, M\u00fcnster, Germany"}]},{"given":"Pascal","family":"Sch\u00f6ttle","sequence":"additional","affiliation":[{"name":"University of M\u00fcnster, M\u00fcnster, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Proceedings of SPIE","first-page":"902806","volume-title":"Media Watermarking, Security, and Forensics","author":"Barni M.","year":"2014","unstructured":"M. Barni , P. Comesa~na-Alfaro , F. P\u00e9rez-Gonzalez , and B. Tondi . Are you threatening me?: Towards smart detectors in watermarking . In A. M. Alattar, N. D. Memon, and C. D. Heitzenrater, editors, Media Watermarking, Security, and Forensics 2014 , volume 9028 of Proceedings of SPIE , pages 902806 -- 902806 . 2014. M. Barni, P. Comesa~na-Alfaro, F. P\u00e9rez-Gonzalez, and B. Tondi. Are you threatening me?: Towards smart detectors in watermarking. In A. M. Alattar, N. D. Memon, and C. D. Heitzenrater, editors, Media Watermarking, Security, and Forensics 2014, volume 9028 of Proceedings of SPIE, pages 902806--902806. 2014."},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"Bas P.","year":"2011","unstructured":"P. Bas , T. Filler , and T. Pevny . Break our steganographic system | the ins and outs of organizing BOSS . In T. Filler, T. Pevny, S. Craver, and A. Ker, editors, Information Hiding , volume 6958 of Lecture Notes in Computer Science , pages 59 -- 70 . Springer , 2011 . P. Bas, T. Filler, and T. Pevny. Break our steganographic system | the ins and outs of organizing BOSS. In T. Filler, T. Pevny, S. Craver, and A. Ker, editors, Information Hiding, volume 6958 of Lecture Notes in Computer Science, pages 59--70. Springer, 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-ifs:20055151"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.632226"},{"key":"e_1_3_2_1_5_1","volume-title":"The Morgan Kaufmann Series in Multimedia Information and Systems. Morgan Kaufmann","author":"Cox I. J.","year":"2002","unstructured":"I. J. Cox , M. Miller , J. Bloom , J. Fridrich , and T. Kalker . Digital watermarking and steganography . The Morgan Kaufmann Series in Multimedia Information and Systems. Morgan Kaufmann , 2002 . I. J. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital watermarking and steganography. The Morgan Kaufmann Series in Multimedia Information and Systems. Morgan Kaufmann, 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"M.\n      El Choubassi\n     and \n      P.\n      Moulin\n  . \n  On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks\n  . In E. J. Delp III and P. W. Wong editors Security Steganography and Watermarking of Multimedia Contents VIII volume \n  6072\n   of \n  Proceedings of SPIE pages \n  1\n  --\n  12\n  . \n  2006\n  .  M. El Choubassi and P. Moulin. On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In E. J. Delp III and P. W. Wong editors Security Steganography and Watermarking of Multimedia Contents VIII volume 6072 of Proceedings of SPIE pages 1--12. 2006.","DOI":"10.1117\/12.640659"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379109"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/597040"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1039910"},{"key":"e_1_3_2_1_10_1","series-title":"Proceedings of SPIE","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1117\/12.435408","volume-title":"Security and Watermarking of Multimedia Contents III","author":"Furon T.","year":"2001","unstructured":"T. Furon , I. Venturini , and P. Duhamel . Unified approach of asymmetric watermarking schemes . In E. J. Delp III and P. W. Wong, editors, Security and Watermarking of Multimedia Contents III , volume 4314 of Proceedings of SPIE , pages 269 -- 279 . 2001 . T. Furon, I. Venturini, and P. Duhamel. Unified approach of asymmetric watermarking schemes. In E. J. Delp III and P. W. Wong, editors, Security and Watermarking of Multimedia Contents III, volume 4314 of Proceedings of SPIE, pages 269--279. 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.817598"},{"key":"e_1_3_2_1_12_1","first-page":"119","volume-title":"IEEE Benelux Signal Processing Symposium","author":"Kalker T.","year":"1998","unstructured":"T. Kalker . Watermark estimation through detector observations . In IEEE Benelux Signal Processing Symposium , pages 119 -- 122 , 1998 . T. Kalker. Watermark estimation through detector observations. In IEEE Benelux Signal Processing Symposium, pages 119--122, 1998."},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/3-540-49380-8_18","volume-title":"Information Hiding","author":"Linnartz J.-P. M. G.","year":"1998","unstructured":"J.-P. M. G. Linnartz and M. van Dijk . Analysis of the sensitivity attack against electronic watermarks in images . In D. Aucsmith, editor, Information Hiding , volume 1525 of Lecture Notes in Computer Science , pages 258 -- 272 . Springer , 1998 . J.-P. M. G. Linnartz and M. van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In D. Aucsmith, editor, Information Hiding, volume 1525 of Lecture Notes in Computer Science, pages 258--272. Springer, 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0348-5027-8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2002.1027816"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415328"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551492_14"}],"event":{"name":"IH&MMSec '14: ACM Information Hiding and Multimedia Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Salzburg Austria","acronym":"IH&MMSec '14"},"container-title":["Proceedings of the 2nd ACM workshop on Information hiding and multimedia security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600918.2600939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:39Z","timestamp":1750278159000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,11]]},"references-count":17,"alternative-id":["10.1145\/2600918.2600939","10.1145\/2600918"],"URL":"https:\/\/doi.org\/10.1145\/2600918.2600939","relation":{},"subject":[],"published":{"date-parts":[[2014,6,11]]},"assertion":[{"value":"2014-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}