{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:08:02Z","timestamp":1725692882087},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642285790"},{"type":"electronic","value":"9783642285806"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-28580-6_2","type":"book-chapter","created":{"date-parts":[[2012,7,28]],"date-time":"2012-07-28T06:51:13Z","timestamp":1343458273000},"page":"19-32","source":"Crossref","is-referenced-by-count":2,"title":["The Copyright Protection System for Android Platform"],"prefix":"10.1007","author":[{"given":"Yueh-Hong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hsiang-Cheh","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Digital Watermarking","author":"I.L. Cox","year":"2001","unstructured":"Cox, I.L., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)"},{"key":"2_CR2","volume-title":"Digital Watermarking and Steganography","author":"I.L. Cox","year":"2007","unstructured":"Cox, I.L., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Elsevier Science & Technology, London (2007)"},{"key":"2_CR3","first-page":"51","volume":"1","author":"H.C. Huang","year":"2010","unstructured":"Huang, H.C., Chen, Y.H., Abraham, A.: Optimized watermarking using swarm-based bacterial foraging. Journal of Information Hiding and Multimedia Signal Processing\u00a01, 51\u201358 (2010)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s00500-008-0326-8","volume":"13","author":"H.C. Huang","year":"2009","unstructured":"Huang, H.C., Chen, Y.H.: Genetic fingerprinting for copyright protection of multicast media. Soft Computing\u00a013, 383\u2013391 (2009)","journal-title":"Soft Computing"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.simpat.2009.09.004","volume":"18","author":"H.C. Huang","year":"2010","unstructured":"Huang, H.C., Fang, W.C.: Metadata-based image watermarking for copyright protection. Simulation Modelling Practice and Theory\u00a018, 436\u2013445 (2010)","journal-title":"Simulation Modelling Practice and Theory"},{"key":"2_CR6","doi-asserted-by":"publisher","DOI":"10.1142\/5471","volume-title":"Intelligent Watermarking Techniques","author":"J.S. Pan","year":"2004","unstructured":"Pan, J.S., Huang, H.C., Jain, L.C.: Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)"},{"key":"2_CR7","series-title":"SCI","volume-title":"Information Hiding and Applications","year":"2009","unstructured":"Pan, J.-S., Huang, H.-C., Jain, L.C. (eds.): Information Hiding and Applications. SCI, vol.\u00a0227. Springer, Heidelberg (2009)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"C.T. Hsu","year":"1999","unstructured":"Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing\u00a08, 58\u201368 (1999)","journal-title":"IEEE Trans. on Image Processing"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Duan, F.Y., King, I., Chan, L.W., Xu, L.: Intra-block max-min algorithm for embedding robust digital watermark into images. In: Proc. Multimedia Information Analysis and Retrieval, pp. 255\u2013264 (1998)","DOI":"10.1007\/BFb0016503"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035, 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"2_CR11","unstructured":"Chen, Y.H., Su, J.M., Fu, H.C., Huang, H.C., Pao, H.T.: Adaptive watermarking using relationships between wavelet coefficients. In: Proc. IEEE International Symposium on Circuits and Systems, pp. 4979\u20134982 (2005)"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11633-010-0009-7","volume":"7","author":"R.S. Asamwar","year":"2010","unstructured":"Asamwar, R.S., Bhurchandi, K.M., Gandhi, A.S.: Interpolation of images using discrete wavelet transform to simulate image resizing as in human vision. International Journal of Automation and Computing\u00a07, 9\u201316 (2010)","journal-title":"International Journal of Automation and Computing"}],"container-title":["Intelligent Systems Reference Library","Recent Advances in Information Hiding and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28580-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T18:27:18Z","timestamp":1674844038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28580-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642285790","9783642285806"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28580-6_2","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2013]]}}}