{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:52:16Z","timestamp":1771613536507,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2001]]},"DOI":"10.1109\/5.959338","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T20:14:45Z","timestamp":1030220085000},"page":"1403-1418","source":"Crossref","is-referenced-by-count":106,"title":["Image authentication techniques for surveillance applications"],"prefix":"10.1109","volume":"89","author":[{"given":"F.","family":"Bartolini","sequence":"first","affiliation":[]},{"given":"A.","family":"Tefas","sequence":"additional","affiliation":[]},{"given":"M.","family":"Barni","sequence":"additional","affiliation":[]},{"given":"I.","family":"Pitas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5085-3"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4327-5","volume-title":"Multimedia Video-based Surveillance Systems. Requirements, Issues and Solutions","author":"Foresti","year":"2000"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/5.959335"},{"key":"ref4","article-title":"Special session on signal processing for multimedia surveillance systems","volume-title":"Proc. EUSIPCO 2000, 10th Eur. Signal Processing Conf."},{"key":"ref5","volume-title":"Applied Cryptography","author":"Schneier","year":"1994"},{"key":"ref6","volume-title":"Cryptography, Theory and Practice","author":"Stinson","year":"1995"},{"key":"ref7","article-title":"Digital watermarking for the authentication of AVS data","volume-title":"EUSIPCO00, 10th Eur. Signal Processing Conf.","author":"Barni"},{"key":"ref8","volume-title":"95\/46\/CE Directive of the European Union","year":"1995"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/30.267415"},{"key":"ref10","article-title":"Image authentication for a slippery new age","volume":"20","author":"Walton","year":"1995","journal-title":"Dr. Dobb\u2019s J. Software Tools Prof. Programmers"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560423"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.638587"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/5.771070"},{"key":"ref14","article-title":"Image authentication and tamper proofing using mathematical morphology","volume-title":"Proc. EUSIPCO 2000, 10th Eur. Signal Processing Conf.","author":"Tefas"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/5.687830"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.631957"},{"key":"ref18","first-page":"513","article-title":"Application-driven requirements for digital watermarking technology","volume-title":"Proc. EMMSEC98, Eur. Multimedia Microproc. System and Electronic Commerce Conf. and Exhibition","author":"Piva"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/5.771072"},{"key":"ref20","first-page":"29","article-title":"Methods for tamper detection in digital images","volume-title":"GMD Report 85, Proc. Multimedia and Security Work at ACM Multimedia \u201999","author":"Fridrich"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/12.205315"},{"key":"ref22","first-page":"95","volume-title":"Secure Spread Spectrum Watermarking for Multimedia","author":"Cox","year":"1995"},{"key":"ref23","article-title":"Copyright protection for multimedia data","volume-title":"Proc. Int. Conf. Digital Media and Electronic Publishing","author":"Koch"},{"key":"ref24","first-page":"187","article-title":"Video-steganography","volume-title":"Proc. IMA, Intellectual Property Project","volume":"I","author":"Matsui"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1994.413536"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.821622"},{"key":"ref27","article-title":"Special session on second generation digital watermarking methods"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/49.668979"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.778260"},{"key":"ref30","article-title":"Information hiding terminology","volume-title":"Lecture Notes in Computer Science","volume":"1174","author":"Pfitzmann","year":"1996"},{"key":"ref31","article-title":"Special Issue on Identification and Protection of Multimedia Information","volume":"87"},{"key":"ref32","article-title":"Digital watermarking of visual data: State of the art and new trends","volume-title":"Proc. EUSIPCO00, 10th Eur. Signal Processing Conf.","author":"Barni"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.779111"},{"key":"ref34","first-page":"455","article-title":"A public key watermark for image verification and authentication","volume-title":"Proc. ICIP98, IEEE Int. Conf. Image Processing","volume":"I","author":"Wong"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1117\/12.384997"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1117\/12.384969"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723521"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/83.855442"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(01)00037-8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1117\/12.344703"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1117\/12.344706"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723518"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723413"},{"key":"ref44","first-page":"21","article-title":"A blind wavelet based digital signature for image authentication","volume-title":"Proc. EUSIPCO98, 9th Eur. Signal Processing Conf.","author":"Xie"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723401"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.817228"},{"key":"ref47","first-page":"131","article-title":"Compression-compatible fragile and semi-fragile tamper detection","volume-title":"Security and Watermarking of Multimedia Contents, Proc. SPIE","volume":"3971","author":"Marbel"},{"key":"ref48","article-title":"Color image embedding using multidimensional lattices structure","volume-title":"Proc. ICIP98, IEEE Int. Conf. Image Processing","author":"Manjunath"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1117\/12.134183"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/49.668974"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1142\/9789812792662_0001"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2001.921005"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.821618"},{"key":"ref54","volume-title":"Image Analysis and Mathematical Morphology","author":"Serra","year":"1982"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6017-0"},{"key":"ref56","article-title":"Image authentication and tamper proofing using chaotic mixing and mathematical morphology","author":"Tefas","year":"1999","journal-title":"IEEE Trans. Image Processing"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_436"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5\/20732\/00959338.pdf?arnumber=959338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T07:59:24Z","timestamp":1742716764000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/959338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"references-count":57,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/5.959338","relation":{},"ISSN":["0018-9219"],"issn-type":[{"value":"0018-9219","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}