{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T15:55:17Z","timestamp":1692719717140},"reference-count":23,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1016\/j.dsp.2009.07.004","type":"journal-article","created":{"date-parts":[[2009,7,29]],"date-time":"2009-07-29T09:33:56Z","timestamp":1248860036000},"page":"442-453","source":"Crossref","is-referenced-by-count":36,"title":["A novel CRT-based watermarking technique for authentication of multimedia contents"],"prefix":"10.1016","volume":"20","author":[{"given":"Jagdish C.","family":"Patra","sequence":"first","affiliation":[]},{"given":"A.","family":"Karthik","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"Bornand","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3\u20134","key":"10.1016\/j.dsp.2009.07.004_bib001","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"35","author":"Bender","year":"1996","journal-title":"IBM Syst. J."},{"issue":"12","key":"10.1016\/j.dsp.2009.07.004_bib002","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"10.1016\/j.dsp.2009.07.004_bib003","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1109\/5.771068","article-title":"Watermarking as communication with side information","volume":"87","author":"Cox","year":"1999","journal-title":"Proc. IEEE"},{"issue":"10","key":"10.1016\/j.dsp.2009.07.004_bib004","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1109\/83.951543","article-title":"Secret and public key image watermarking schemes for image authentication and ownership verification","volume":"10","author":"Wong","year":"2001","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"10.1016\/j.dsp.2009.07.004_bib005","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.1016\/j.patcog.2006.02.009","article-title":"Owner\u2013customer right protection mechanism using a watermarking scheme and a watermarking protocol","volume":"39","author":"Chen","year":"2006","journal-title":"Pattern Recognition"},{"issue":"2","key":"10.1016\/j.dsp.2009.07.004_bib006","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","article-title":"A robust image authentication method distinguishing JPEG compression from malicious manipulation","volume":"11","author":"Lin","year":"2001","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"1","key":"10.1016\/j.dsp.2009.07.004_bib007","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"Hsu","year":"1999","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"10.1016\/j.dsp.2009.07.004_bib008","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1049\/ip-vis:20030167","article-title":"Watermark detection based on the properties of error control codes","volume":"150","author":"Loo","year":"2003","journal-title":"IEE Proc. Vis. Image Signal Process."},{"key":"10.1016\/j.dsp.2009.07.004_bib009","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1016\/j.dsp.2007.10.004","article-title":"A simple ICA-based watermarking scheme","volume":"18","author":"Nguyen","year":"2008","journal-title":"Digit. Signal Process."},{"issue":"1","key":"10.1016\/j.dsp.2009.07.004_bib010","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"Liu","year":"2002","journal-title":"IEEE Trans. Multimed."},{"issue":"4","key":"10.1016\/j.dsp.2009.07.004_bib011","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.csi.2005.03.006","article-title":"A semi-blind digital watermarking scheme based on singular value decomposition","volume":"28","author":"Shieh","year":"2006","journal-title":"Comput. Stand. Interf."},{"key":"10.1016\/j.dsp.2009.07.004_bib012","first-page":"525","article-title":"An SVD-based watermarking method for image content authentication with improved security","volume":"vol. 2","author":"Lee","year":"2005"},{"issue":"1","key":"10.1016\/j.dsp.2009.07.004_bib013","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.amc.2006.09.117","article-title":"On SVD-based watermarking algorithm","volume":"188","author":"Chung","year":"2007","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.dsp.2009.07.004_bib014","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","article-title":"SVD-based digital image watermarking scheme","volume":"26","author":"Chang","year":"2005","journal-title":"Pattern Recognition Lett."},{"key":"10.1016\/j.dsp.2009.07.004_bib015","series-title":"Proc. IEEE Asia Pacific Conference on Circuits and Systems, Singapore","first-page":"1984","article-title":"An improved SVD-based watermarking technique for image and document authentication","author":"Patra","year":"2006"},{"issue":"6","key":"10.1016\/j.dsp.2009.07.004_bib016","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/S0167-4048(02)01016-7","article-title":"Hierarchical access control based on Chinese remainder theorem","volume":"2","author":"Chen","year":"2002","journal-title":"Comput. Secur."},{"key":"10.1016\/j.dsp.2009.07.004_bib017","doi-asserted-by":"crossref","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","article-title":"Sharing secrets in stego images with authentication","volume":"41","author":"Chang","year":"2008","journal-title":"Pattern Recognition"},{"issue":"9","key":"10.1016\/j.dsp.2009.07.004_bib018","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1109\/LCOMM.2005.1506715","article-title":"A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem","volume":"9","author":"Myung","year":"2005","journal-title":"IEEE Comm. Lett."},{"key":"10.1016\/j.dsp.2009.07.004_bib019","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1016\/S0898-1221(03)90191-X","article-title":"RNS sign detector based on Chinese remainder theorem II (CRT II)","volume":"46","author":"Al-Radadi","year":"2003","journal-title":"Comput. Math. Appl."},{"issue":"1","key":"10.1016\/j.dsp.2009.07.004_bib020","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.jnca.2008.03.004","article-title":"Robust t-out-of-n oblivious transfer mechanism based on CRT","volume":"32","author":"Chang","year":"2009","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.dsp.2009.07.004_bib021","series-title":"Proc. IEEE Int. Conf. Systems, Man, and Cybernetics (SMC 2008), Singapore","first-page":"3250","article-title":"Robust CRT-based watermarking technique for authentication of image and document","author":"Patra","year":"2008"},{"key":"10.1016\/j.dsp.2009.07.004_bib022","series-title":"Applied Cryptography","author":"Schneier","year":"1996"},{"key":"10.1016\/j.dsp.2009.07.004_bib023","series-title":"Cryptography: Theory and Practice","author":"Stinson","year":"1995"}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200409001365?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200409001365?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,17]],"date-time":"2018-12-17T22:27:06Z","timestamp":1545085626000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1051200409001365"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["S1051200409001365"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2009.07.004","relation":{},"ISSN":["1051-2004"],"issn-type":[{"value":"1051-2004","type":"print"}],"subject":[],"published":{"date-parts":[[2010,3]]}}}