{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T13:56:47Z","timestamp":1724421407762},"reference-count":34,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1016\/j.dsp.2010.03.010","type":"journal-article","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T04:51:27Z","timestamp":1270011087000},"page":"1597-1611","source":"Crossref","is-referenced-by-count":145,"title":["A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression"],"prefix":"10.1016","volume":"20","author":[{"given":"Jagdish C.","family":"Patra","sequence":"first","affiliation":[]},{"given":"Jiliang E.","family":"Phua","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"Bornand","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3&4","key":"10.1016\/j.dsp.2010.03.010_bib001","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"35","author":"Bender","year":"1996","journal-title":"IBM Systems J."},{"issue":"12","key":"10.1016\/j.dsp.2010.03.010_bib002","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"10.1016\/j.dsp.2010.03.010_bib003","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1109\/5.771068","article-title":"Watermarking as communication with side information","volume":"87","author":"Cox","year":"1999","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.dsp.2010.03.010_bib004","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","article-title":"Robust image watermarking in the spatial domain","volume":"66","author":"Nikolaidis","year":"1997","journal-title":"Signal Process."},{"issue":"10","key":"10.1016\/j.dsp.2010.03.010_bib005","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1109\/83.951543","article-title":"Secret and public key image watermarking schemes for image authentication and ownership verification","volume":"10","author":"Wong","year":"2001","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"10.1016\/j.dsp.2010.03.010_bib006","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.1016\/j.patcog.2006.02.009","article-title":"Owner\u2013customer right protection mechanism using a watermarking scheme and a watermarking protocol","volume":"39","author":"Chen","year":"2006","journal-title":"Pattern Recogn."},{"issue":"2","key":"10.1016\/j.dsp.2010.03.010_bib007","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","article-title":"A robust image authentication method distinguishing JPEG compression from malicious manipulation","volume":"11","author":"Lin","year":"2001","journal-title":"IEEE Trans. Circuits Systems Video Technol."},{"issue":"1","key":"10.1016\/j.dsp.2010.03.010_bib008","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"Hsu","year":"1999","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.dsp.2010.03.010_bib009","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","article-title":"A DCT-domain system for robust image watermarking","volume":"66","author":"Barni","year":"1997","journal-title":"Signal Process."},{"key":"10.1016\/j.dsp.2010.03.010_bib010","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.sigpro.2007.07.020","article-title":"Human visual system based adaptive digital image watermarking","volume":"88","author":"Qi","year":"2007","journal-title":"Signal Process."},{"issue":"2","key":"10.1016\/j.dsp.2010.03.010_bib011","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.aeue.2008.11.006","article-title":"Wavelet-based watermarking for color images through visual masking","volume":"64","author":"Liu","year":"2010","journal-title":"AEU Int. J. Electronics Commun."},{"key":"10.1016\/j.dsp.2010.03.010_bib012","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1016\/j.dsp.2007.10.004","article-title":"A simple ICA-based watermarking scheme","volume":"18","author":"Nguyen","year":"2008","journal-title":"Digital Signal Process."},{"key":"10.1016\/j.dsp.2010.03.010_bib013","doi-asserted-by":"crossref","first-page":"3740","DOI":"10.1016\/j.patcog.2007.05.004","article-title":"Circularly orthogonal moments for geometrically robust image watermarking","volume":"40","author":"Xin","year":"2007","journal-title":"Pattern Recogn."},{"key":"10.1016\/j.dsp.2010.03.010_bib014","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.dsp.2004.08.002","article-title":"Applications of the naturalness preserving transform to image watermarking and data hiding","volume":"14","author":"Ahmed","year":"2004","journal-title":"Digital Signal Process."},{"key":"10.1016\/j.dsp.2010.03.010_bib015","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","article-title":"A local Tchebichef moments-based robust image watermarking","volume":"89","author":"Deng","year":"2009","journal-title":"Signal Process."},{"issue":"1","key":"10.1016\/j.dsp.2010.03.010_bib016","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"Liu","year":"2002","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.dsp.2010.03.010_bib017","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","article-title":"An improved SVD-based watermarking scheme for protecting rightful ownership","volume":"88","author":"Mohammad","year":"2008","journal-title":"Signal Process."},{"issue":"4","key":"10.1016\/j.dsp.2010.03.010_bib018","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.csi.2005.03.006","article-title":"A semi-blind digital watermarking scheme based on singular value decomposition","volume":"28","author":"Shieh","year":"2006","journal-title":"Comput. Stand. Interf."},{"key":"10.1016\/j.dsp.2010.03.010_bib019","unstructured":"S. Lee, D. Jang, C.D. Yoo, An SVD-based watermarking method for image content authentication with improved security, in: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Process. vol. 2, March 2005, pp. 525\u2013528"},{"issue":"1","key":"10.1016\/j.dsp.2010.03.010_bib020","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.amc.2006.09.117","article-title":"On SVD-based watermarking algorithm","volume":"188","author":"Chung","year":"2007","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.dsp.2010.03.010_bib021","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","article-title":"SVD-based digital image watermarking scheme","volume":"26","author":"Chang","year":"2005","journal-title":"Pattern Recogn. Lett."},{"key":"10.1016\/j.dsp.2010.03.010_bib022","doi-asserted-by":"crossref","unstructured":"J.C. Patra, W. Soh, E.L. Ang, P.K. Meher, An improved SVD-based watermarking technique for image and document authentication, in: Proc. IEEE Asia Pacific Conference on Circuits and Systems, Singapore, December 2006, pp. 1984\u20131987","DOI":"10.1109\/APCCAS.2006.342276"},{"key":"10.1016\/j.dsp.2010.03.010_bib023","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.compeleceng.2008.06.002","article-title":"Hardware assisted watermarking for multimedia","volume":"35","author":"Kougianos","year":"2009","journal-title":"Comp. Electrical Eng."},{"key":"10.1016\/j.dsp.2010.03.010_bib024","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/0016-0032(92)90099-3","article-title":"The Chinese remainder theorem","author":"Ku","year":"1992","journal-title":"J. Franklin Inst. 329 (I)"},{"issue":"6","key":"10.1016\/j.dsp.2010.03.010_bib025","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/S0167-4048(02)01016-7","article-title":"Hierarchical access control based on Chinese remainder theorem","volume":"2","author":"Chen","year":"2002","journal-title":"Comp. Security"},{"key":"10.1016\/j.dsp.2010.03.010_bib026","doi-asserted-by":"crossref","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","article-title":"Sharing secrets in stego images with authentication","volume":"41","author":"Chang","year":"2008","journal-title":"Pattern Recogn."},{"issue":"9","key":"10.1016\/j.dsp.2010.03.010_bib027","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1109\/LCOMM.2005.1506715","article-title":"A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem","volume":"9","author":"Myung","year":"2005","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.dsp.2010.03.010_bib028","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1016\/S0898-1221(03)90191-X","article-title":"RNS sign detector based on Chinese remainder theorem II (CRT II)","volume":"46","author":"Al-Radadi","year":"2003","journal-title":"Comp. Math. Appl."},{"issue":"1","key":"10.1016\/j.dsp.2010.03.010_bib029","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.jnca.2008.03.004","article-title":"Robust t-out-of-n oblivious transfer mechanism based on CRT","volume":"32","author":"Chang","year":"2009","journal-title":"J. Network Comp. Appl."},{"key":"10.1016\/j.dsp.2010.03.010_bib030","doi-asserted-by":"crossref","unstructured":"J.C. Patra, A. Karthik, P.K. Meher, C. Bornand, Robust CRT-based watermarking technique for authentication of image and document, in: Proc. IEEE Int. Conf. Systems, Man, and Cybernetics (SMC 2008), Singapore, October 2008, pp. 3250\u20133255","DOI":"10.1109\/ICSMC.2008.4811797"},{"key":"10.1016\/j.dsp.2010.03.010_bib031","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.dsp.2009.07.004","article-title":"A novel CRT-based watermarking technique for authentication of multimedia contents","volume":"20","author":"Patra","year":"2010","journal-title":"Digital Signal Process."},{"key":"10.1016\/j.dsp.2010.03.010_bib032","series-title":"Applied Cryptography","author":"Schneier","year":"1996"},{"issue":"6","key":"10.1016\/j.dsp.2010.03.010_bib033","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1109\/76.867936","article-title":"Embedding image watermarks in DC components","volume":"10","author":"Huang","year":"2000","journal-title":"IEEE Trans. Circuits Systems Video Technol."},{"key":"10.1016\/j.dsp.2010.03.010_bib034","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1109\/TIP.2006.873476","article-title":"Blind MPEG-2 video watermarking robust against geometric attacks: A set of approaches in DCT domain","volume":"15","author":"Wang","year":"2006","journal-title":"IEEE Trans. Image Process."}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200410000795?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200410000795?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T17:12:14Z","timestamp":1558977134000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1051200410000795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["S1051200410000795"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2010.03.010","relation":{},"ISSN":["1051-2004"],"issn-type":[{"value":"1051-2004","type":"print"}],"subject":[],"published":{"date-parts":[[2010,12]]}}}