{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:46:16Z","timestamp":1725540376196},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642051968"},{"type":"electronic","value":"9783642051975"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05197-5_25","type":"book-chapter","created":{"date-parts":[[2009,11,2]],"date-time":"2009-11-02T09:20:49Z","timestamp":1257153649000},"page":"345-357","source":"Crossref","is-referenced-by-count":1,"title":["Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images"],"prefix":"10.1007","author":[{"given":"Michele","family":"Scagliola","sequence":"first","affiliation":[]},{"given":"Pietro","family":"Guccione","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MMUL.2005.46","volume":"12","author":"V. Licks","year":"2005","unstructured":"Licks, V., Jordan, R.: Geometric attacks on image watermarking systems. IEEE Multimedia\u00a012, 68\u201378 (2005)","journal-title":"IEEE Multimedia"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"J.J. \u00d3Ruanaidh","year":"1998","unstructured":"\u00d3Ruanaidh, J.J., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process\u00a066, 303\u2013317 (1998)","journal-title":"Signal Process"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C.Y. Lin","year":"2001","unstructured":"Lin, C.Y., Wu, M., Bloom, J., Cox, I., Miller, M., Lui, Y.: Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on Image Processing\u00a010, 767\u2013782 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"doi-asserted-by":"crossref","unstructured":"Bas, P., Chassery, J.M., Macq, B.M.: Robust watermarking based on the warping of predefined triangular patterns. In: Proc. SPIE, Security and Watermarking of Multimedia Contents II, vol.\u00a03971, pp. 99\u2013109 (2000)","key":"25_CR4","DOI":"10.1117\/12.385013"},{"doi-asserted-by":"crossref","unstructured":"Simitopoulos, D., Koutsonanos, D., Strintzis, M.: Image watermarking resistant to geometric attacks using generalized radon transformations. In: 14th International Conference on Digital Signal Processing. DSP 2002, vol.\u00a01, pp. 85\u201388 (2002)","key":"25_CR5","DOI":"10.1109\/ICDSP.2002.1027821"},{"unstructured":"Xin, Y., Liao, S., Pawlak, M.: Geometrically robust image watermarking via pseudo-zernike moments. In: Canadian Conference on Electrical and Computer Engineering, May 2-5, vol.\u00a02, pp. 939\u2013942 (2004)","key":"25_CR6"},{"key":"25_CR7","volume-title":"Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications","year":"2004","unstructured":"Barni, M., Bartolini, F. (eds.): Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, 1st edn. CRC, Boca Raton (2004)","edition":"1"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M. Barni","year":"1998","unstructured":"Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A dct-domain system for robust image watermarking. Signal Process\u00a066, 357\u2013372 (1998)","journal-title":"Signal Process"},{"unstructured":"Toft, P.: The Radon Tranform - Theory and Implementation. PhD thesis, Department of Mathematical Modelling. Technical University od Denmark (1996)","key":"25_CR9"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/JRA.1987.1087088","volume":"3","author":"J. Lee","year":"1987","unstructured":"Lee, J., Haralick, R.M., Shapiro, L.G.: Morphological edge detector. IEEE Transactions on Robotics and Automation\u00a03, 142\u2013153 (1987)","journal-title":"IEEE Transactions on Robotics and Automation"},{"key":"25_CR11","volume-title":"Digital image processing","author":"R.C. Gonzalez","year":"2002","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital image processing. Prentice Hall, Englewood Cliffs (2002)"},{"unstructured":"Stone, H.S., Tao, B., McGuire, M.: Analysis of image registration noise due to rotationally dependent aliasing. Technical Report TR 98-018, Nec Research Institute Tech. Rep. (1998)","key":"25_CR12"},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/TIP.2005.847302","volume":"14","author":"K. Jafari-Khouzani","year":"2005","unstructured":"Jafari-Khouzani, K., Soltanian-Zadeh, H.: Rotation-invariant multiresolution texture analysis using radon and wavelet transforms. IEEE Transactions on Image Processing\u00a014, 783\u2013795 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TIFS.2007.897266","volume":"2","author":"Q. Li","year":"2007","unstructured":"Li, Q., Cox, I.J.: Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Transactions on Information Forensics and Security\u00a02, 127\u2013139 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"25_CR15","first-page":"669","volume-title":"Handbook of Image and Video Proc.","author":"T. Pappas","year":"2000","unstructured":"Pappas, T., Safranek, R.: Perceptual criteria for image quality evaluation. In: Handbook of Image and Video Proc., pp. 669\u2013684. Academic Press, London (2000)"},{"doi-asserted-by":"crossref","unstructured":"Watson, A.B.: DCT quantization matrices visually optimized for individual images. In: Allebach, J.P., Rogowitz, B.E. (eds.) Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol.\u00a01913, pp. 202\u2013216 (1993)","key":"25_CR16","DOI":"10.1117\/12.152694"}],"container-title":["Communications in Computer and Information Science","e-Business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05197-5_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:49:16Z","timestamp":1606186156000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05197-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642051968","9783642051975"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05197-5_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}