{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:26:47Z","timestamp":1725776807362},"reference-count":19,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iwsoc.2003.1213006","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"60-65","source":"Crossref","is-referenced-by-count":27,"title":["IP watermarking techniques: survey and comparison"],"prefix":"10.1109","author":[{"given":"A.T.","family":"Abdel-Hamid","sequence":"first","affiliation":[]},{"given":"S.","family":"Tahar","sequence":"additional","affiliation":[]},{"family":"El Mostapha Aboulhamid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1999.810718"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/DAC.2002.1012585","article-title":"Watermarking Integer Linear Programming Solutions","author":"megerian","year":"2002","journal-title":"Proceedings of the 39th conference on Design automation ACM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ASIC.2001.954736"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/43.945306"},{"key":"ref14","first-page":"219","article-title":"Attacks on copyright marking systems","author":"petitcolas","year":"1998","journal-title":"Proc Info Hiding Second Int Workshop"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"journal-title":"Network Working Group","article-title":"RFC 1321: The MD5 Message-Digest Algorithm","year":"1992","author":"rivest","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/4.826826"},{"article-title":"Embedded System Design: A unified Hardware\/Software Introduction","year":"2002","author":"vahid","key":"ref18"},{"year":"1997","key":"ref19","article-title":"VSI Alliance Architecture Document: Version 1.0"},{"article-title":"A Practical manual on the Monte Carlo Method for Random Walk Problems","year":"1959","author":"cashwell","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/78.824679"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1117\/1.1494075"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1998.694985"},{"journal-title":"VSI Alliance White Paper","article-title":"Intellectual Property Protection: Schemes, Alternatives and Discussion","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.678190"},{"article-title":"Surviving the SOC Revolution: A Guide to Platform-Based Design","year":"1999","author":"chang","key":"ref2"},{"journal-title":"Cadence Design Systems White Paper","article-title":"Cadence System Level Design and Verification","year":"0","key":"ref1"},{"article-title":"The Codebreakers: The Story of Secret Writing","year":"1996","author":"kahn","key":"ref9"}],"event":{"name":"3rd IEEE International Workshop on System-on-Chip for Real-Time Applications","acronym":"IWSOC-03","location":"Calgary, Alta., Canada"},"container-title":["The 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8609\/27279\/01213006.pdf?arnumber=1213006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T23:37:19Z","timestamp":1623713839000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1213006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwsoc.2003.1213006","relation":{},"subject":[]}}