{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:33:09Z","timestamp":1729625589683,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icita.2005.42","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T23:01:37Z","timestamp":1123110097000},"page":"597-602","source":"Crossref","is-referenced-by-count":0,"title":["A Robust Watermarking Scheme Combined with the FSVQ for Images"],"prefix":"10.1109","volume":"2","author":[{"family":"Yih-Chuan Lin","sequence":"first","affiliation":[]},{"family":"Zni-Kang Huang","sequence":"additional","affiliation":[]},{"family":"Ri-Ting Pong","sequence":"additional","affiliation":[]},{"family":"Chuen-Ching Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094577"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560428"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/83.136594"},{"key":"11","first-page":"452","article-title":"Towards robust and hidden image copyright labeling","author":"koch","year":"1995","journal-title":"Proc IEEE Nonlinear Signal and Image Processing"},{"key":"12","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"hsu","year":"1999","journal-title":"IEEE Trans on Image Processing"},{"journal-title":"Technique Report","article-title":"Watermarking images","year":"1994","author":"dautzenberg","key":"3"},{"year":"1989","author":"turner","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"10","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","article-title":"A DCT-domain system for robust image watermarking","volume":"66","author":"barni","year":"1998","journal-title":"Signal Processing"},{"key":"7","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1117\/12.274502","article-title":"A review of watermarking and the importance of perceptual modeling","author":"cox","year":"1997","journal-title":"Proc SPIE Int Conf Human Vision and Electronic Imaging II"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00017-6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-91094-3_16"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/103085.103089"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:19960711"}],"event":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","location":"Sydney, Australia"},"container-title":["Third International Conference on Information Technology and Applications (ICITA'05)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9966\/32022\/01489031.pdf?arnumber=1489031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T21:54:08Z","timestamp":1497650048000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1489031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icita.2005.42","relation":{},"subject":[]}}