{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T21:13:45Z","timestamp":1723238025388},"reference-count":16,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1016\/j.cose.2009.08.008","type":"journal-article","created":{"date-parts":[[2009,9,11]],"date-time":"2009-09-11T09:35:37Z","timestamp":1252661737000},"page":"269-277","source":"Crossref","is-referenced-by-count":16,"title":["An efficient and fair buyer\u2013seller fingerprinting scheme for large scale networks"],"prefix":"10.1016","volume":"29","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[]},{"given":"Hao-Chuan","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Yi-Pei","family":"Hsieh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"9","key":"10.1016\/j.cose.2009.08.008_bib1","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","article-title":"An improved SVD-based watermarking scheme for protecting rightful ownership","volume":"88","author":"Ahmad","year":"2008","journal-title":"Signal Processing"},{"key":"10.1016\/j.cose.2009.08.008_bib2","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of ACM annual conference on computer and communications security; 1993. pp. 62\u201373.","DOI":"10.1145\/168588.168596"},{"issue":"3","key":"10.1016\/j.cose.2009.08.008_bib3","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.csi.2007.08.013","article-title":"Color image watermarking scheme based on linear discriminant analysis","volume":"30","author":"Fu","year":"2008","journal-title":"Computer Standards & Interfaces"},{"issue":"11","key":"10.1016\/j.cose.2009.08.008_bib4","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/TCSVT.2006.884011","article-title":"Reversible visible watermarking and lossless recovery of original images","volume":"16","author":"Hu","year":"2006","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"10.1016\/j.cose.2009.08.008_bib5","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TCSVT.2005.858742","article-title":"An algorithm for removable visible watermarking","volume":"16","author":"Hu","year":"2006","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.cose.2009.08.008_bib6","series-title":"Guide to elliptic curve cryptography","author":"Hankerson","year":"2004"},{"issue":"4","key":"10.1016\/j.cose.2009.08.008_bib7","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/TIFS.2008.2002939","article-title":"A buyer\u2013seller watermarking protocol based on secure embedding","volume":"3","author":"Katzenbeisser","year":"2008","journal-title":"IEEE Transactions on Forensics and Security"},{"key":"10.1016\/j.cose.2009.08.008_bib8","doi-asserted-by":"crossref","unstructured":"Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y. A blind watermarking method using maximum wavelet coefficient quantization. Expert Systems with Applications 2009;36(9):11509\u201316.","DOI":"10.1016\/j.eswa.2009.03.060"},{"issue":"12","key":"10.1016\/j.cose.2009.08.008_bib9","doi-asserted-by":"crossref","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","article-title":"An efficient and anonymous buyer\u2013seller watermarking protocol","volume":"13","author":"Lei","year":"2004","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"10.1016\/j.cose.2009.08.008_bib10","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1109\/83.913598","article-title":"A buyer\u2013seller watermarking protocol","volume":"9","author":"Memon","year":"2001","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.cose.2009.08.008_bib11","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1049\/el:19980686","article-title":"On key control in key agreement protocols","volume":"34","author":"Mitchell","year":"1998","journal-title":"Electronics Letters"},{"issue":"3","key":"10.1016\/j.cose.2009.08.008_bib12","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1006\/jvci.1998.0391","article-title":"Watermarking schemes and protocols for protecting rightful ownership and customer's rights","volume":"9","author":"Qian","year":"1998","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"2","key":"10.1016\/j.cose.2009.08.008_bib13","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.cose.2009.08.008_bib14","series-title":"Applied cryptography","author":"Schneier","year":"1996"},{"issue":"1","key":"10.1016\/j.cose.2009.08.008_bib15","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1179\/174313107X214240","article-title":"Improving robustness of visible image watermark","volume":"56","author":"Shie","year":"2008","journal-title":"The Imaging Science Journal"},{"key":"10.1016\/j.cose.2009.08.008_bib16","series-title":"Cryptography: theory and practice","author":"Stinson","year":"1995"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000881?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000881?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T14:04:14Z","timestamp":1558533854000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404809000881"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["S0167404809000881"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2009.08.008","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2010,3]]}}}