{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:31:21Z","timestamp":1729668681749,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/bioms.2012.6345778","type":"proceedings-article","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T17:13:37Z","timestamp":1352999617000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Information fusion based on Fuzzy Fourier Transform of fingerprints for image watermarking"],"prefix":"10.1109","author":[{"given":"G.","family":"Iovane","sequence":"first","affiliation":[]},{"given":"M.","family":"Leone","sequence":"additional","affiliation":[]},{"given":"P.","family":"Giordano","sequence":"additional","affiliation":[]},{"given":"E.","family":"Benedetto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.1997.628384"},{"key":"17","article-title":"Embedding robust labels into images for copyright protection","author":"zhao","year":"1995","journal-title":"Int Congress on Intellectual Property Rights for Specialized Information"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.647964"},{"key":"15","article-title":"An audio digital watermarking algorithm transmitted via air channel in double dct domain","author":"zhang","year":"2011","journal-title":"ICMT"},{"key":"16","article-title":"Secure spread spectrum watermarking for multimedia","author":"tamane","year":"2012","journal-title":"International Journal of Computer Science and Information Technology"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918843"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ARTCom.2010.11"},{"key":"11","first-page":"2012","article-title":"A novel approach for spatial domain authentication system design in telemedicines","author":"aa","year":"0","journal-title":"ICICC"},{"key":"12","article-title":"Digitalwatermarking: A solution to electronic copyright management system requirements","author":"bartolini","year":"2000","journal-title":"9th Intl World Wide Web Conference Culture Track"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2000.844194"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1117\/12.344689","article-title":"A dwtbased algorithm for spatio-frequency masking of digital signatures","author":"barni","year":"1999","journal-title":"Security and Watermarking of Multimedia Contents"},{"key":"22","article-title":"Efficient watermarking strategies. automated production of cross media content for multi-channel distribution","author":"steinebach","year":"2007","journal-title":"AXMEDIS '07 Third International Conference"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/NRSC.2007.371376"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1109\/34.192463","article-title":"A theory for multiresolution signal decomposition: The wavelet representation","author":"mallat","year":"1989","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1006\/jath.1994.1085"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/83.841531"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/34.765653"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/34.761265"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1201\/9781420036053.ch13"},{"key":"3","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1080\/09720529.2010.10698312","article-title":"Biometric watermarking via wavelet approach, reverse engineering in infosecurity and dematerialization of public administration","volume":"13","author":"iovane","year":"0","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-010-0031-1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00017-6"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"30","article-title":"Fuzzy numbers: An overview","author":"dubois","year":"1987","journal-title":"Analysis of Fuzzy Information"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1109\/ICIP.1994.413536","article-title":"A digital watermark","author":"van schyndel","year":"1994","journal-title":"IEEE International Conference on Image Processing"},{"key":"6","article-title":"Attacks on copyright marking systems","author":"li","year":"2009","journal-title":"International Journal of Electronics and Communications"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.819759"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2005.10698021"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560422"},{"key":"8","article-title":"Copyright protection of vector map using digital watermarking in the spatial domain","author":"kim","year":"2011","journal-title":"IDCTA"}],"event":{"name":"2012 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS)","start":{"date-parts":[[2012,9,14]]},"location":"Salerno, Italy","end":{"date-parts":[[2012,9,14]]}},"container-title":["2012 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6338386\/6345770\/06345778.pdf?arnumber=6345778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:43:49Z","timestamp":1498013029000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6345778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/bioms.2012.6345778","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}