{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T04:12:53Z","timestamp":1740111173112,"version":"3.37.3"},"reference-count":28,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","award":["89E-FA06-2-4-8","NSC92-2213-E-002-023","NSC92-2622-E-002-002","NSC93-2752-E-002-006-PAE"],"id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001868","name":"National Science Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards & Interfaces"],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1016\/j.csi.2007.08.012","type":"journal-article","created":{"date-parts":[[2007,8,30]],"date-time":"2007-08-30T11:15:15Z","timestamp":1188472515000},"page":"271-287","source":"Crossref","is-referenced-by-count":1,"title":["Content adaptive watermarking for multimedia fingerprinting"],"prefix":"10.1016","volume":"30","author":[{"given":"Yu-Tzu","family":"Lin","sequence":"first","affiliation":[]},{"given":"Ja-Ling","family":"Wu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.csi.2007.08.012_bib1","series-title":"Proc. CRYPTO\u201995","first-page":"452","article-title":"Collusion-secure fingerprinting for digital data","author":"Boneh","year":"1995"},{"key":"10.1016\/j.csi.2007.08.012_bib2","first-page":"480","article-title":"Tracing traitors","volume":"vol. 839","author":"Chor","year":"1994"},{"key":"10.1016\/j.csi.2007.08.012_bib3","doi-asserted-by":"crossref","unstructured":"A. Fiat, M. Naor, \u201cBroadcast Encryption\u201d, CRYPTO\u201993, pp. 480\u2013491.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"10.1016\/j.csi.2007.08.012_bib4","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1023\/A:1008209004667","article-title":"Some new results on key distribution patterns and broadcast encryption","volume":"14","author":"Stinson","year":"1998","journal-title":"Designs, Codes and Cryptography"},{"key":"10.1016\/j.csi.2007.08.012_bib5","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1023\/A:1008268610932","article-title":"On some methods for unconditionally secure key distribution and broadcast encryption","volume":"12","author":"Stinson","year":"1997","journal-title":"Design, Codes and Cryptography"},{"key":"10.1016\/j.csi.2007.08.012_bib6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1137\/S0895480196304246","article-title":"Combinatorial properties and constructions of traceability schemes and frameproof codes","volume":"11","author":"Stinson","year":"1998","journal-title":"SIAM Journal on Discrete Mathematics"},{"issue":"4","key":"10.1016\/j.csi.2007.08.012_bib7","first-page":"456","article-title":"Combining digital watermarks and collusion secure fingerprints for digital images","volume":"9","author":"Dittmann","year":"2000","journal-title":"JEI"},{"key":"10.1016\/j.csi.2007.08.012_bib8","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/TSP.2003.809378","article-title":"Anti-collusion fingerprinting for multimedia","volume":"51","author":"Trappe","year":"2003","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10.1016\/j.csi.2007.08.012_bib9","unstructured":"http:\/\/www.its.caltech.edu\/~ssachan\/math6b\/design.pdf."},{"key":"10.1016\/j.csi.2007.08.012_bib10","doi-asserted-by":"crossref","first-page":"1312","DOI":"10.1109\/TIT.2003.810630","article-title":"Applications of list decoding to tracing traitors","volume":"49","author":"Silverberg","year":"2003","journal-title":"IEEE Transactions Information Theory"},{"key":"10.1016\/j.csi.2007.08.012_bib11","doi-asserted-by":"crossref","DOI":"10.1109\/ICASSP.2004.1327244","article-title":"Bandwidth efficient fingerprint multicast for video streaming","author":"Zhao","year":"2004","journal-title":"IEEE International Conference on Acoustics, Speech and Signal Processing"},{"key":"10.1016\/j.csi.2007.08.012_bib12","first-page":"211","article-title":"A code for sequential traitor tracing","author":"Safavi-Naini","year":"2002","journal-title":"ASPCS"},{"key":"10.1016\/j.csi.2007.08.012_bib13","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/TIT.2003.810629","article-title":"Sequential traitor tracing","volume":"49","author":"Safavi-Naini","year":"2003","journal-title":"IEEE Transaction on Information Technology"},{"key":"10.1016\/j.csi.2007.08.012_bib14","series-title":"ACM Multimedia\u201998","first-page":"61","article-title":"Content based watermarking of images","author":"Kankanhalli","year":"1998"},{"key":"10.1016\/j.csi.2007.08.012_bib15","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/49.668975","article-title":"Image-adaptive watermarking using visual models","volume":"16","author":"Podilchuk","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"10.1016\/j.csi.2007.08.012_bib16","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1109\/49.668976","article-title":"Multiresolution scene-based video watermarking using perceptual models","volume":"16","author":"Swanson","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communication"},{"issue":"15\u201319","key":"10.1016\/j.csi.2007.08.012_bib17","first-page":"2893","article-title":"Maximizing strength of digital watermarks using neural networks","volume":"4","author":"Davis","year":"2001","journal-title":"IEEE International Conference in Neural Networks"},{"key":"10.1016\/j.csi.2007.08.012_bib18","first-page":"1517","article-title":"Adaptive watermark scheme with RBF neural networks","author":"Zilang","year":"2003","journal-title":"IEEE International Conference on Neural Networks & Signal Processing"},{"issue":"6","key":"10.1016\/j.csi.2007.08.012_bib19","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","article-title":"Video fingerprinting and encryption principles for digital rights management","volume":"92","author":"Kundur","year":"2004","journal-title":"Proceeding of the IEEE"},{"key":"10.1016\/j.csi.2007.08.012_bib20","series-title":"SPIE Electronic Imaging 2000, San Jose","article-title":"A watermark optimization technique based on genetic algorithms","author":"Huang","year":"2000"},{"issue":"2","key":"10.1016\/j.csi.2007.08.012_bib21","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MMUL.2004.1289040","article-title":"Soft-decision tracing in fingerprinted multimedia content","volume":"11","author":"Fernandez","year":"2004","journal-title":"IEEE MultiMedia"},{"issue":"9","key":"10.1016\/j.csi.2007.08.012_bib22","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/5.58325","article-title":"The self-organizing map","volume":"78","author":"Kohonen","year":"1990","journal-title":"Proceeding of The IEEE"},{"issue":"3","key":"10.1016\/j.csi.2007.08.012_bib23","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1109\/18.915661","article-title":"Combinatorial properties of frameproof and traceability codes","volume":"47","author":"Staddon","year":"2001","journal-title":"IEEE Transaction on Information Theory"},{"key":"10.1016\/j.csi.2007.08.012_bib24","series-title":"Neural Networks: Algorithms, Applications, and Programming Techniques","first-page":"267","author":"Freeman","year":"1992"},{"key":"10.1016\/j.csi.2007.08.012_bib25","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Transaction on Image Processing"},{"key":"10.1016\/j.csi.2007.08.012_bib26","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"Hsu","year":"1999","journal-title":"IEEE Transaction on Image Processing"},{"key":"10.1016\/j.csi.2007.08.012_bib27","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/6046.944472","article-title":"An additive approach to transform-domain information hiding and optimum detection structure","volume":"3","author":"Cheng","year":"2001","journal-title":"IEEE Transaction on Multimedia"},{"key":"10.1016\/j.csi.2007.08.012_bib28","series-title":"EURASIP","first-page":"2153","article-title":"Group-oriented fingerprinting for multimedia forensics","author":"Wang","year":"2004"}],"container-title":["Computer Standards & Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548907000785?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548907000785?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T23:33:01Z","timestamp":1684020781000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548907000785"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["S0920548907000785"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2007.08.012","relation":{},"ISSN":["0920-5489"],"issn-type":[{"type":"print","value":"0920-5489"}],"subject":[],"published":{"date-parts":[[2008,7]]}}}