{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:41:16Z","timestamp":1730212876281,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/cyberc.2014.58","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T18:45:14Z","timestamp":1419965114000},"page":"286-289","source":"Crossref","is-referenced-by-count":4,"title":["Effect of Embedding Way on Printed Watermarking Image by Lithography"],"prefix":"10.1109","author":[{"given":"Xie","family":"Yong","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Tan","family":"Haihu","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Juanjuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"27","article-title":"Research of DWT image watermarking policy based on adaptive embedding intensity[J]","volume":"33","author":"jiang","year":"2005","journal-title":"Journal of Henan Normal University (Natural Science)"},{"key":"2","first-page":"691","article-title":"Moment estimation of embedding strength for digital image watermark","volume":"16","author":"jin","year":"2005","journal-title":"J Computer-Aided Design Comput Graph"},{"key":"1","first-page":"174","article-title":"Optimal estimation of the embedding strength for the digital image watermarking","volume":"33","author":"jin","year":"2004","journal-title":"Infrared and Laser Engineering[J]"},{"key":"7","first-page":"2249","article-title":"Attack detection in watermarked images with PSNR and RGB intensity[J]","volume":"3","author":"chauhan","year":"2013","journal-title":"International Journal of Advanced Computer Research"},{"key":"6","first-page":"790","article-title":"Analysis and comparison of holographic and traditional digital image watermarking in DWT domain[C]","author":"yong","year":"2012","journal-title":"ICCS"},{"key":"5","first-page":"23","article-title":"Optical image encryption based on computer generated hologram and chaotic theory[J]","volume":"34","author":"jian","year":"2013","journal-title":"Laser Journal"},{"key":"4","first-page":"364","article-title":"Digital reconstruction of Fourier CGH and the elimination of aliasing image[J]","volume":"32","author":"liman","year":"2007","journal-title":"Optical Technique"},{"key":"8","first-page":"104","article-title":"A kind of printing and scanning tilt distortion resistant digital watermarking algorithm[J]","volume":"34","author":"yong","year":"2013","journal-title":"Packaging Engineering"}],"event":{"name":"2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","start":{"date-parts":[[2014,10,13]]},"location":"Shanghai, China","end":{"date-parts":[[2014,10,15]]}},"container-title":["2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975797\/6984259\/06984321.pdf?arnumber=6984321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:52:39Z","timestamp":1490316759000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6984321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/cyberc.2014.58","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}