{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:14:08Z","timestamp":1725516848531},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540794981"},{"type":"electronic","value":"9783540794998"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79499-8_34","type":"book-chapter","created":{"date-parts":[[2008,8,16]],"date-time":"2008-08-16T12:35:36Z","timestamp":1218890136000},"page":"442-456","source":"Crossref","is-referenced-by-count":0,"title":["A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol"],"prefix":"10.1007","author":[{"given":"Bin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Lanjun","family":"Dang","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Kou","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"3","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer\u2019s rights. Journal of Visual Communication and Image Representation\u00a03, 194\u2013210 (1998)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"4","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Processing\u00a04, 643\u2013649 (2001)","journal-title":"IEEE Trans. Image Processing"},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"12","author":"C.-L. Lei","year":"2004","unstructured":"Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Processing\u00a012, 1618\u20131626 (2004)","journal-title":"IEEE Trans. Image Processing"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1049\/ip-ifs:20055069","volume":"1","author":"J. Zhang","year":"2006","unstructured":"Zhang, J., Kou, W., Fan, K.: Secure buyer-seller watermarking protocol. IEE Proceeding of Information Security\u00a01, 15\u201318 (2006)","journal-title":"IEE Proceeding of Information Security"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1109\/TIP.2005.859383","volume":"12","author":"M. Kuribayashi","year":"2005","unstructured":"Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Processing\u00a012, 2129\u20132139 (2005)","journal-title":"IEEE Trans. Image Processing"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSP.2003.809378","volume":"4","author":"W. Trappe","year":"2003","unstructured":"Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Processing\u00a04, 1069\u20131087 (2003)","journal-title":"IEEE Trans. Signal Processing"},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/TIP.2004.837557","volume":"12","author":"K. Solanki","year":"2004","unstructured":"Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Robust Image-Adaptive Data Hiding Using Erasure and Error Correction. IEEE Trans. Image Processing\u00a012, 1627\u20131639 (2004)","journal-title":"IEEE Trans. Image Processing"},{"key":"34_CR8","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"34_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T., Uchiyama, S.: A New Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 308\u2013318. Springer, Heidelberg (1998)"},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"4","author":"G.K. Wallace","year":"1991","unstructured":"Wallace, G.K.: The JPEG still picture compression standard. Communications of the ACM\u00a04, 30\u201344 (1991)","journal-title":"Communications of the ACM"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: FMCO 2004, vol.\u00a03657(1), pp. 25\u201327 (1999)","DOI":"10.1117\/12.344672"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79499-8_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:19:24Z","timestamp":1606166364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79499-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540794981","9783540794998"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79499-8_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}