{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:39:22Z","timestamp":1725529162867},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642004049"},{"type":"electronic","value":"9783642004056"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00405-6_27","type":"book-chapter","created":{"date-parts":[[2009,3,7]],"date-time":"2009-03-07T04:50:05Z","timestamp":1236401405000},"page":"244-255","source":"Crossref","is-referenced-by-count":2,"title":["New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication"],"prefix":"10.1007","author":[{"given":"Raghu","family":"Gantasala","sequence":"first","affiliation":[]},{"given":"Munaga V. N. K.","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Kundur, D., Hatzinkos, D.: Digital watermarking for Telltale Tamper-Proofing and Authentication. In: Proceedings of the IEEE Special Issue on Identification of Multimedia Information, vol.\u00a087(7), pp. 1167\u20131180 (1999)","DOI":"10.1109\/5.771070"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"R., XIE, R., Wu, K., Li, C., Zhu, S.: An Improved Semi-fragile Digital Watermarking Scheme for Image Authentication. In: IEEE International Workshop on Anti-counterfeiting and Security, vol.\u00a016(18), pp. 262\u2013265 (2007)","DOI":"10.1109\/IWASID.2007.373740"},{"issue":"12","key":"27_CR3","doi-asserted-by":"publisher","first-page":"3445","DOI":"10.1109\/78.258085","volume":"41","author":"J.M. Shapiro","year":"1993","unstructured":"Shapiro, J.M.: Embedded image coding using zero trees of wavelet coefficients. IEEE Transactions on Signal processing\u00a041(12), 3445\u20133462 (1993)","journal-title":"IEEE Transactions on Signal processing"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/2.511977","volume":"29","author":"H. Berghel","year":"1996","unstructured":"Berghel, H., O\u2019Gorman, L.: Protecting ownership rights through digital watermarking. IEEE Computer Mag.\u00a029, 101\u2013103 (1996)","journal-title":"IEEE Computer Mag."},{"issue":"7","key":"27_CR5","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans., Image Process\u00a06(7), 1673\u20131687 (1997)","journal-title":"IEEE Trans., Image Process"},{"issue":"12","key":"27_CR6","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TCSVT.2005.856932","volume":"15","author":"P.W. Chan","year":"2005","unstructured":"Chan, P.W., Lyu, M.R., Chin, R.T.: A novel scheme for hybrid digital video watermarking approach, evaluation and experimentation. IEEE Trans. Circuits System. Video Technology\u00a015(12), 1638\u20131649 (2005)","journal-title":"IEEE Trans. Circuits System. Video Technology"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-24624-4_21","volume-title":"Digital Watermarking","author":"B. Abdel Aziz","year":"2004","unstructured":"Abdel Aziz, B., Chouinard, J.Y.: On perceptual quality of watermarked images \u2013 an experimental approach. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 277\u2013288. Springer, Heidelberg (2004)"},{"issue":"3","key":"27_CR8","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N. Nikolaidis","year":"1998","unstructured":"Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Processing\u00a066(3), 385\u2013403 (1998)","journal-title":"Signal Processing"},{"issue":"6","key":"27_CR9","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TIP.2002.1014990","volume":"11","author":"M.U. Celik","year":"2002","unstructured":"Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process\u00a011(6), 585\u2013595 (2002)","journal-title":"IEEE Trans. Image Process"},{"key":"27_CR10","unstructured":"Voyatzis, G., Pitas, I.: Application of total automarphisms in image watermarking. In: Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, vol.\u00a01(19), pp. 237\u2013240 (1996)"},{"issue":"1","key":"27_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMM.2003.819759","volume":"6","author":"D.P. Mukherjes","year":"2004","unstructured":"Mukherjes, D.P., Maitra, S., Acton, S.T.: Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans. Multimedia\u00a06(1), 1\u20135 (2004)","journal-title":"IEEE Trans. Multimedia"},{"key":"27_CR12","unstructured":"Wong, P.W.: A public key watermark for image verification and authentication. In: Proceeding of the IEEE International Conference on Image Processing, Chicago, vol.\u00a01(4), pp. 425\u2013429 (1998)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Kallel, I.F., Kallel, M., Garcia, E., Bouhlel, M.S.: Fragile Watermarking for medical Image Authentication. In: 2nd International conference on Distributed framework for multimedia applications, pp. 1\u20136 (2006)","DOI":"10.1109\/DFMA.2006.296919"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of watermarking in medical imaging. In: Proceedings IEEE EMBS International Conference on Information Technology Applications in Biomedicine, pp. 250\u2013255 (2000)","DOI":"10.1109\/ITAB.2000.892396"},{"issue":"8","key":"27_CR15","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s11517-006-0081-x","volume":"44","author":"Giakoumaki","year":"2006","unstructured":"Giakoumaki, Pavlopoulos, S., Koutsouris, D.: Secure and efficient health data management through multiple watermarks on medical images. Journal on medical and biological engineering and computing\u00a044(8), 619\u2013631 (2006)","journal-title":"Journal on medical and biological engineering and computing"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Coelho, Fernanda, B., Barbar, do Salem, J., Carmo, Gustavo, S.B.: The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through the use of the Wavelet Transform. In: International conference on Internet, web applications and services, pp. 48\u201349 (2007)","DOI":"10.1109\/ICIW.2007.62"},{"issue":"5","key":"27_CR17","doi-asserted-by":"publisher","first-page":"401","DOI":"10.4218\/etrij.02.0202.0502","volume":"24","author":"S. Joo","year":"2002","unstructured":"Joo, S., Suh, Y., Shin, J., Kikuchi, H., Cho, S.-J.: A New Robust Watermark Embedding into Wavelet DC Components. ETRI Journal\u00a024(5), 401\u2013404 (2002)","journal-title":"ETRI Journal"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Liang, T.-s., Rodriguez, J.J.: Robust image watermarking using inversely proportional embedding. In: 4th IEEE Southwest Symposium on Image Analysis and Interpretation, pp. 182\u2013186 (2000)","DOI":"10.1109\/IAI.2000.839596"},{"key":"27_CR19","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: A Secure, Robust Watermark for Multimedia. In: IEEE International Conference on Image Processing, vol.\u00a03(2), pp. 461\u2013465 (1996)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Yuan, H., Zhang, X.-P.: Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication. In: International Conference on Image Processing, pp. 505\u2013508 (2003)","DOI":"10.1109\/ICIP.2003.1247009"},{"issue":"10","key":"27_CR21","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1109\/LSP.2007.896436","volume":"14","author":"X. Zhang","year":"2007","unstructured":"Zhang, X., Wang, S.: Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Processing Letters\u00a014(10), 727\u2013730 (2007)","journal-title":"IEEE Signal Processing Letters"},{"key":"27_CR22","unstructured":"Tong, L., Xiangyi, H., Yiqi, D.: Semi-fragile watermarking for image content authentication. In: 7th International Conference on Signal Processing, pp. 2342\u20132345 (2004)"},{"key":"27_CR23","unstructured":"Qin, Q., Wang, W., Chen, S., Chen, D., Fu, W.: Research of digital semi-fragile watermarking of remote sensing image based on wavelet analysis. In: IEEE International Conference on Geoscience and Remote Sensing Symposium, vol.\u00a04(20), pp. 2542\u20132545 (2004)"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, L., Liand, W., Fettweis, A.: Lossy transformation technique applied to the synthesis of multidimensional lossless filters. In: IEEE International Symposium on Circuits and Systems, vol.\u00a03(3), pp. 926\u2013929 (1993)","DOI":"10.1109\/ISCAS.1993.393874"},{"issue":"6","key":"27_CR25","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/S0165-1684(01)00039-1","volume":"81","author":"S. Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modeling toward a second generation watermarking benchmark. Signal Processing\u00a081(6), 1177\u20131214 (2001)","journal-title":"Signal Processing"},{"issue":"3","key":"27_CR26","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MMUL.2004.1","volume":"11","author":"D. Kirovski","year":"2004","unstructured":"Kirovski, D., Malvar, H.S., Yacobi, Y.: A dual watermarking and fingerprinting system. IEEE Multimedia\u00a011(3), 59\u201373 (2004)","journal-title":"IEEE Multimedia"},{"issue":"1","key":"27_CR27","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TMM.2004.840617","volume":"7","author":"K. Su","year":"2005","unstructured":"Su, K., Kundur, D., Hatzinakos, D.: Statistical invisibility for collusion-resistant digital video watermarking. IEEE Trans. on Multimedia\u00a07(1), 43\u201351 (2005)","journal-title":"IEEE Trans. on Multimedia"},{"issue":"4","key":"27_CR28","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/49.668976","volume":"16","author":"M.D. Swanson","year":"1998","unstructured":"Swanson, M.D., Zhu, B., Tewfik, A.H.: Multi resolution scene-based video watermarking using perceptual models. IEEE J. Sel. Areas Commun.\u00a016(4), 540\u2013550 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Barr, J., Bradley, B., Hannigan, B.T.: Using digital watermarks with image signatures to mitigate the threat of the copy attack. In: Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., vol.\u00a03, pp. 69\u201372 (2003)","DOI":"10.1109\/ICASSP.2003.1199109"},{"key":"27_CR30","unstructured":"Kutter, M., Voloshynovskiy, S., Herrigel, A.: The watermark copy attack. In: Proc. SPIE: Security and watermarking of multimedia contents II, vol.\u00a03, pp. 97\u2013101 (2000)"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Meerwald, P., Uhl, A.: A survey of wavelet-domain watermarking algorithms. In: Proc. of SPIE, Electronic Imaging, Security and watermarking of Multimedia Contents III, CA, USA, vol.\u00a04314, pp. 505\u2013516 (2001)","DOI":"10.1117\/12.435434"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of IEEE International Conference on Image Processing, pp. 219\u2013222 (1996)","DOI":"10.1109\/ICIP.1996.560423"},{"issue":"8","key":"27_CR33","first-page":"58","volume":"1","author":"C.T. Hsu","year":"1999","unstructured":"Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. Image Process\u00a01(8), 58\u201368 (1999)","journal-title":"IEEE Trans. Image Process"},{"issue":"16","key":"27_CR34","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"3","author":"C.I. Podilchuk","year":"1998","unstructured":"Podilchuk, C.I., Zeng, W.: Image \u2013adaptive watermarking using visual models. IEEE J. Selected Areas Comm.\u00a03(16), 525\u2013539 (1998)","journal-title":"IEEE J. Selected Areas Comm."},{"issue":"46","key":"27_CR35","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/30.826391","volume":"1","author":"X.-m. Niu","year":"2000","unstructured":"Niu, X.-m., Lu, Z.-m., Sum, S.-h.: Digital watermarking of still images with gray-level digital watermarks. IEEE Trans. Consumer Electron\u00a01(46), 137\u2013145 (2000)","journal-title":"IEEE Trans. Consumer Electron"},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Craver, S., Memon, N., Yeo, B.L., Yeung, M.: Can invisible watermarks resolve rightful ownerships?, IBM Research Report, TC205209 (1996)","DOI":"10.1117\/12.263419"},{"key":"27_CR37","unstructured":"Niu, X.-m., Sum, S.-h.: Adaptive gray-level digital watermark. In: Proceedings of International Conference on Signal Processing, vol.\u00a02, pp. 1293\u20131296 (2000)"}],"container-title":["Communications in Computer and Information Science","Information Systems, Technology and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00405-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T10:10:58Z","timestamp":1558174258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00405-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642004049","9783642004056"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00405-6_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}