{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:11:46Z","timestamp":1761707506628},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Comput. Grap. Appl."],"published-print":{"date-parts":[[1999]]},"DOI":"10.1109\/38.736465","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T17:57:42Z","timestamp":1030211862000},"page":"18-24","source":"Crossref","is-referenced-by-count":52,"title":["Protecting digital image copyrights: a framework"],"prefix":"10.1109","volume":"19","author":[{"given":"G.","family":"Voyatzis","sequence":"first","affiliation":[]},{"given":"I.","family":"Pitas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibg10188","first-page":"452","article-title":"towards robust and hidden image copyright labeling","author":"koch","year":"1995","journal-title":"Proc IEEE Workshop on Nonlinear Signal and Image Processing"},{"key":"bibg10189","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"bibg101820","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00017-6"},{"key":"bibg10186","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.4655281"},{"key":"bibg10187","first-page":"40","article-title":"techniques for data hiding","volume":"2420","author":"bender","year":"1995","journal-title":"Proc SPIE"},{"key":"bibg10184","volume":"66","year":"1998","journal-title":"Signal Processing"},{"key":"bibg10185","volume":"16","year":"1998","journal-title":"IEEE J Selected Areas in Communication"},{"key":"bibg10182","author":"stinson","year":"1995","journal-title":"Cryptography Theory and Practice"},{"key":"bibg10183","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"bibg101817","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49380-8_16","article-title":"attacks on copyright marking systems","author":"petitcolas","year":"1998","journal-title":"Proc Second Workshop on Information Hiding"},{"key":"bibg101818","doi-asserted-by":"publisher","DOI":"10.1109\/49.668979"},{"key":"bibg101819","doi-asserted-by":"publisher","DOI":"10.1109\/49.668980"},{"key":"bibg101813","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"bibg101814","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723411"},{"key":"bibg101815","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/S0165-1684(98)00013-9","article-title":"watermarking algorithm based on a human visual model","volume":"66","author":"delaigle","year":"1998","journal-title":"Signal Processing"},{"key":"bibg10181","doi-asserted-by":"publisher","DOI":"10.1109\/5.387094"},{"key":"bibg101816","doi-asserted-by":"publisher","DOI":"10.1109\/49.668975"},{"key":"bibg101810","first-page":"460","article-title":"applying signatures on digital images","author":"pitas","year":"1995","journal-title":"Proc IEEE Workshop on Nonlinear Signal and Image Processing"},{"key":"bibg101811","doi-asserted-by":"publisher","DOI":"10.1006\/jvci.1998.0391"},{"key":"bibg101812","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.647970"}],"container-title":["IEEE Computer Graphics and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx4\/38\/15880\/00736465.pdf?arnumber=736465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:06:10Z","timestamp":1638216370000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/736465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"references-count":20,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/38.736465","relation":{},"ISSN":["0272-1716"],"issn-type":[{"value":"0272-1716","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}