{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:33Z","timestamp":1750306713534,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T00:00:00Z","timestamp":1403827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,27]]},"DOI":"10.1145\/2659532.2659597","type":"proceedings-article","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T12:42:27Z","timestamp":1414500147000},"page":"100-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A digital watermarking scheme for image tamper detection"],"prefix":"10.1145","author":[{"given":"Zlatoliliya","family":"Ilcheva","sequence":"first","affiliation":[{"name":"Institute of Information and Communication Technologies, Bulgarian Academy of Sciences"}]},{"given":"Nikodim","family":"Lazarov","sequence":"additional","affiliation":[{"name":"Institute of Information and Communication Technologies, Bulgarian Academy of Sciences"}]}],"member":"320","published-online":{"date-parts":[[2014,6,27]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"25","article-title":"A Study on Watermarking Schemes for Image Authentication","volume":"2","author":"Radharani S.","year":"2010","unstructured":"Radharani , S. , M. L. Valarmathi . \" A Study on Watermarking Schemes for Image Authentication \", International Journal of Computer Applications (0975--8887) , Vol. 2 , No. 4 , June 2010 , 25 -- 27 . Radharani, S., M. L. Valarmathi. \"A Study on Watermarking Schemes for Image Authentication\", International Journal of Computer Applications (0975--8887), Vol. 2, No. 4, June 2010, 25--27.","journal-title":"International Journal of Computer Applications (0975--8887)"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsa.2012.2605"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941335"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of SPIE International Conference on Storage and Retrieval of Image\/Video Database","volume":"3312","author":"Lin C. Y.","year":"1998","unstructured":"Lin , C. Y. , S. F. Chang . \" A Robust Image Authentication Method Surviving JPEG Lossy Compression \" , In: Proceedings of SPIE International Conference on Storage and Retrieval of Image\/Video Database , Vol. 3312 , 1998 , 296--307. Lin, C. Y., S. F. Chang. \"A Robust Image Authentication Method Surviving JPEG Lossy Compression\", In: Proceedings of SPIE International Conference on Storage and Retrieval of Image\/Video Database, Vol. 3312, 1998, 296--307."},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"18","article-title":"Information Authentication for a Slippery New Age","volume":"20","author":"Walton S..","year":"1995","unstructured":"Walton , S.. \" Information Authentication for a Slippery New Age \", Dr Dobb's Journal , 1995 , 20 ( 4 ), 18 -- 26 . Walton, S.. \"Information Authentication for a Slippery New Age\", Dr Dobb's Journal, 1995, 20(4), 18--26.","journal-title":"Dr Dobb's Journal"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of IEEE International Conference on Image Processing","author":"Wong P. W..","year":"1998","unstructured":"Wong , P. W.. \" A Public Key Watermark for Image Verification and Authentication\" , In: Proceedings of IEEE International Conference on Image Processing , 1998 , 455--459. Wong, P. W.. \"A Public Key Watermark for Image Verification and Authentication\", In: Proceedings of IEEE International Conference on Image Processing, 1998, 455--459."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.826780"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.951543"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.1014990"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of IEEE International Conference on Image Processing","author":"Yeung M. M.","year":"1997","unstructured":"Yeung , M. M. , F. Mintzer . \"An Invisible Watermarking Technique For Image Verification\" , In: Proceedings of IEEE International Conference on Image Processing , 1997 , 680--683. Yeung, M. M., F. Mintzer. \"An Invisible Watermarking Technique For Image Verification\", In: Proceedings of IEEE International Conference on Image Processing, 1997, 680--683."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of SPIE Electronic Imaging","volume":"3971","author":"Fridrich J.","year":"2000","unstructured":"Fridrich , J. , M. Goljan , N. Memon . \"Further Attacks on Yeung-Mintzer Watermarking Scheme\" , In: Proceedings of SPIE Electronic Imaging , Vol. 3971 , 2000 , 428--437. Fridrich, J., M. Goljan, N. Memon. \"Further Attacks on Yeung-Mintzer Watermarking Scheme\", In: Proceedings of SPIE Electronic Imaging, Vol. 3971, 2000, 428--437."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceeding of IEEE International Conference on Image Processing","volume":"1","author":"Fridrich J.","year":"2000","unstructured":"Fridrich , J. , M. Goljan , A. C. Baldoza . \"New Fragile Authentication Watermark for Images\" , In: Proceeding of IEEE International Conference on Image Processing , vol. 1 . 2000 , 446--449. Fridrich, J., M. Goljan, A. C. Baldoza. \"New Fragile Authentication Watermark for Images\", In: Proceeding of IEEE International Conference on Image Processing, vol. 1. 2000, 446--449."},{"key":"e_1_3_2_1_13_1","unstructured":"http:\/\/mathworld.wolfram.com\/ArnoldsCatMap.html  http:\/\/mathworld.wolfram.com\/ArnoldsCatMap.html"},{"key":"e_1_3_2_1_14_1","first-page":"614","article-title":"Period of a discrete cat mapping","volume":"603","author":"Dyson F. J.","year":"1992","unstructured":"Dyson , F. J. , H. Falk . \" Period of a discrete cat mapping \", American Mathematical Monthly , 1992 , 603 -- 614 . Dyson, F. J., H. Falk. \"Period of a discrete cat mapping\", American Mathematical Monthly, 1992, 603--614.","journal-title":"American Mathematical Monthly"},{"key":"e_1_3_2_1_15_1","first-page":"156","article-title":"Fractal and Wavelet Image Compression Techniques","volume":"155","author":"Welstead T. S..","year":"1999","unstructured":"Welstead , T. S.. \" Fractal and Wavelet Image Compression Techniques \", SPIE Publications , 1999 , 155 -- 156 . Welstead, T. S.. \"Fractal and Wavelet Image Compression Techniques\", SPIE Publications, 1999, 155--156.","journal-title":"SPIE Publications"}],"event":{"name":"CompSysTech'14: 15th International Conference on Computer Systems and Technologies","sponsor":["UORB University of Ruse, Bulgaria","Querbie Querbie"],"location":"Ruse Bulgaria","acronym":"CompSysTech'14"},"container-title":["Proceedings of the 15th International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659532.2659597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659532.2659597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:21Z","timestamp":1750231161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659532.2659597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,27]]},"references-count":15,"alternative-id":["10.1145\/2659532.2659597","10.1145\/2659532"],"URL":"https:\/\/doi.org\/10.1145\/2659532.2659597","relation":{},"subject":[],"published":{"date-parts":[[2014,6,27]]},"assertion":[{"value":"2014-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}