{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:45:51Z","timestamp":1725475551828},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540671824"},{"type":"electronic","value":"9783540465140"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719724_18","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T02:07:17Z","timestamp":1167358037000},"page":"253-269","source":"Crossref","is-referenced-by-count":7,"title":["On the Design of a Watermarking System: Considerations and Rationales"],"prefix":"10.1007","author":[{"given":"Jean-Paul","family":"Linnartz","sequence":"first","affiliation":[]},{"given":"Geert","family":"Depovere","sequence":"additional","affiliation":[]},{"given":"Ton","family":"Kalker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Kalker, T., Depovere, G., Haitsma, J., Maes, M.J.: A video watermarking system for broadcast monitoring. In: Proceedings of SPIE, Security and Watermarking of Multimedia Content, vol.\u00a03657, pp. 103\u2013112 (1999)","DOI":"10.1117\/12.344661"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/BFb0055868","volume-title":"Computer Security \u2013 ESORICS 98","author":"J.P.M.G. Linnartz","year":"1998","unstructured":"Linnartz, J.P.M.G.: The ticket concept for copy control based on embedded signalling. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 257\u2013274. Springer, Heidelberg (1998)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Bloom, J., Cox, I.J., Kalker, A.A.C., Linnartz, J.P.M.G., Miller, M., Traw, B.: Copy Protection for DVD. IEEE Proceedings, Special issue on Information and Protection of Multimedia Information\u00a087(7), 1267\u20131266 (1999)","DOI":"10.1109\/5.771077"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L.: A review of watermarking and the importance of perceptual modeling. In: Proc. of Electronic Imaging 1997 (February 1997)","DOI":"10.1117\/12.274502"},{"issue":"4","key":"18_CR5","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"I.J. Cox","year":"1998","unstructured":"Cox, I.J., Linnartz, J.P.M.G.: Some general methods for tampering with watermarks. IEEE Journ. of Sel. Areas in Comm.\u00a016(4), 587\u2013593 (1998)","journal-title":"IEEE Journ. of Sel. Areas in Comm."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., McKellips, A.L.: Watermarking as communications with side information. In: IEEE Proc., 87th edn., pp. 1127\u20131141.","DOI":"10.1109\/5.771068"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-49380-8_18","volume-title":"Information Hiding","author":"J.P.M.G. Linnartz","year":"1998","unstructured":"Linnartz, J.P.M.G., Kalker, A.C.C., Depovere, G.F.: Modelling the false-alarm and missed detection rate for electronic watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 258\u2013272. Springer, Heidelberg (1998)"},{"key":"18_CR8","unstructured":"Linnartz, J.P.M.G., Kalker, A.C.C., Depovere, G.F., Beuker, R.: A reliability model for detection of electronic watermarks in digital images. In: Benelux Symposium on Communication Theory, Enschede, October 1997, pp. 202\u2013209 (1997)"},{"key":"18_CR9","volume-title":"Digital Coding of waveforms","author":"N.S. Jayant","year":"1984","unstructured":"Jayant, N.S., Noll, P.: Digital Coding of waveforms, vol.\u00a0255. Prentice Hall, Englewood Cliffs (1984)"},{"key":"18_CR10","unstructured":"Pitas, I., Kaskalis, T.: Signature Casting on Digital Images. In: Proceedings IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras (June 1995)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035(3\/4) (1996)","DOI":"10.1147\/sj.353.0313"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Bender, W., Gruhl, D., Morimoto, N.: Techniques for Data Hiding. In: Proceedings of the SPIE, San Jose CA, USA, February 1995, pp. 2420\u201340 (1995)","DOI":"10.1117\/12.205315"},{"key":"18_CR13","first-page":"175","volume-title":"Proc. Workshop on Information Hiding","author":"I. Cox","year":"1996","unstructured":"Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Proc. Workshop on Information Hiding, May 30 - June 1, pp. 175\u2013190. Univ. of Cambridge, U.K (1996)"},{"key":"18_CR14","volume-title":"Principles of Communication Engineering","author":"J. Wozencraft","year":"1965","unstructured":"Wozencraft, J., Jacobs, I.: Principles of Communication Engineering. Wiley, Chichester (1965)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Miller, M.L., Bloom, J.A.: Computing the probability of false watermark detection. In: Proc. Workshop on Information Hiding 1999, Dresden (1999)","DOI":"10.1007\/10719724_11"},{"key":"18_CR16","first-page":"175","volume-title":"Proc. Workshop on Information Hiding","author":"I. Cox","year":"1996","unstructured":"Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Proc. Workshop on Information Hiding, May 30 - June 1, pp. 175\u2013190. Univ. of Cambridge, U.K (1996)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-49380-8_20","volume-title":"Information Hiding","author":"M. Maes","year":"1998","unstructured":"Maes, M.: Twin peaks: the histogram attack on fized depth watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 290\u2013305. Springer, Heidelberg (1998)"},{"key":"18_CR18","unstructured":"Wireless Communication. In: The Interactive MultiMedia CD ROM, 3rd Edition, Baltzer Science Publishers, Amsterdam (1999), http:\/\/www.baltzer.nl\/wirelesscd"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-49380-8_4","volume-title":"Information Hiding","author":"L.M. Marvel","year":"1998","unstructured":"Marvel, L.M., Boncelet, C.G., Retter, C.T.: In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 48\u201361. Springer, Heidelberg (1998)"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Hernandez, J.R., Perez-Gonzalez, F., Rodriguez, J.M., Nieto, G.: Performance analysius of a 2D Multipulse Amplitude Modulation Scheme for data hiding and watermarking of still images. IEEE JSAC, May 1998 \u00a0Vol.16(4), 510\u2013524 (1998)","DOI":"10.1109\/49.668974"},{"key":"18_CR21","unstructured":"Langelaar, G.C., van der Lubbe, J.C.A., Biemond, J.: Copy protection for multimedia data based on labeling techniques. In: 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands (May 1996)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Depovere, G.F.G., Kalker, A.C.C., Linnartz, J.P.M.G.: Improved watermark detection reliability using filtering before correlation. In: Int. Conf. on Image Processing, ICIP, Chicago IL (October 1998)","DOI":"10.1109\/ICIP.1998.723517"},{"key":"18_CR23","unstructured":"Langelaar, G., Lagendijk, R., Biemond, J.: Removing Spread Spectrum Watermarks. In: Proceedings of Eusipco-1998, Rhodes, vol.\u00a0IV, pp. 2281\u20132284 (1998)"},{"issue":"5","key":"18_CR24","first-page":"355","volume":"40","author":"S.P. Lipshitz","year":"1992","unstructured":"Lipshitz, S.P., Wannamaker, R.A., Vanderkooy, J.: Quantization and Dither: A theoretical survey. J. Audio Eng. Soc\u00a040(5), 355\u2013375 (1992)","journal-title":"J. Audio Eng. Soc"},{"key":"18_CR25","unstructured":"Kalker, T., Janssen, A.J.E.M.: Analysis of SPOMF Detection. Accepted at ICIP 1999, Kobe, Japan (1999)"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Linnartz, J.P.M.G., Kalker, A.A.C., Haitsma, J.: Detecting electronic watermarks in digital video. In: Paper 3010, Invited paper for special session at ICCASP 1999, Phoenix, AR (March 1999)","DOI":"10.1109\/ICASSP.1999.758339"},{"key":"18_CR27","unstructured":"Wu, M., Miller, M., Bloom, J., Cox, I.: Watermark detection and normalized correlation. Presented at ICCASP 1999, Phoenix (March 1999); at DSP Conference in Florance"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719724_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T11:19:33Z","timestamp":1556018373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719724_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540671824","9783540465140"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/10719724_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}