{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:32:49Z","timestamp":1725726769035},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,27]]},"DOI":"10.23919\/fruct53335.2021.9599967","type":"proceedings-article","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T15:39:05Z","timestamp":1637336345000},"page":"79-85","source":"Crossref","is-referenced-by-count":2,"title":["Digital Watermarking System for Hard Cover Objects Against Cloning Attacks"],"prefix":"10.23919","author":[{"given":"Valery","family":"Korzhik","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vladimir","family":"Starostin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Victor","family":"Yakovlev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dmitri","family":"Flaksman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ivan","family":"Bukshin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Boris","family":"Izotov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Mathematische statistic","year":"1957","author":"van der warden","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.31854\/1813-324X-2019-5-3-75-85"},{"key":"ref12","article-title":"Calculation of BER for digital communication","author":"korzhik","year":"1981","journal-title":"Radio Communication Handbook"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2003.1292640"},{"journal-title":"Generation and analysis of graphical codes using textured patterns for printed document authentication","year":"2015","author":"tkachenko","key":"ref4"},{"key":"ref3","article-title":"Generation and analysis of graphical codes using textured patterns for printed document authentication","author":"tkachenko","year":"2015","journal-title":"Signal and Image processing Universit&#x00E9; de Montpellier"},{"key":"ref6","first-page":"226","author":"korzhik","year":"2016","journal-title":"Digital steganography and digital watermarks Part 1 Steganography Monograph SPb SUT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937465"},{"journal-title":"Steganography in Digital Media Principles Algorithms and Applications","year":"2010","author":"fridrich","key":"ref8"},{"key":"ref7","first-page":"198","author":"korzhik","year":"2017","journal-title":"Digital steganography and digital watermarking Part 2 Digital Watermarking Monograph SPb SUT"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7912690"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8840779"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"}],"event":{"name":"2021 30th Conference of Open Innovations Association (FRUCT)","start":{"date-parts":[[2021,10,27]]},"location":"Oulu, Finland","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 30th Conference of Open Innovations Association FRUCT"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9599956\/9599957\/09599967.pdf?arnumber=9599967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T18:45:48Z","timestamp":1647283548000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9599967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,27]]},"references-count":13,"URL":"https:\/\/doi.org\/10.23919\/fruct53335.2021.9599967","relation":{},"subject":[],"published":{"date-parts":[[2021,10,27]]}}}