iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1117/1.1455015
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T03:43:55Z","timestamp":1705031035481},"reference-count":20,"publisher":"SPIE-Intl Soc Optical Eng","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Electron. Imaging"],"published-print":{"date-parts":[[2002,4,1]]},"DOI":"10.1117\/1.1455015","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T10:19:25Z","timestamp":1027678765000},"page":"275","source":"Crossref","is-referenced-by-count":14,"title":["Spatial watermark for image content authentication"],"prefix":"10.1117","volume":"11","author":[{"given":"Maria Paula","family":"Queluz","sequence":"first","affiliation":[]}],"member":"189","reference":[{"key":"10.1117\/1.1455015_r1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1117\/1.1455015_r2","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/S0923-5965(00)00010-2","volume":"16","author":"Queluz","year":"2001","journal-title":"Signal Process. Image Commun.","ISSN":"http:\/\/id.crossref.org\/issn\/0923-5965","issn-type":"print"},{"key":"10.1117\/1.1455015_r3","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/30.267415","volume":"39","author":"Friedman","year":"1993","journal-title":"IEEE Trans. Consum. Electron.","ISSN":"http:\/\/id.crossref.org\/issn\/0098-3063","issn-type":"print"},{"key":"10.1117\/1.1455015_r4","doi-asserted-by":"crossref","unstructured":"C.-Y. Lin and S.-F. Chang, \u201cA robust image authentication method surviving JPEG lossy compression,\u201d inProceedings of IS&T\/SPIE Symposium on Electronics Imaging(1998).","DOI":"10.1117\/12.298462"},{"key":"10.1117\/1.1455015_r5","doi-asserted-by":"crossref","unstructured":"M. P. Queluz, \u201cTowards robust, content based techniques for image authentication,\u201d inProceedings of IEEE 2nd Workshop on Multimedia Signal Processing, P. W. Wong et al., eds., pp. 297\u2013302 (1998).","DOI":"10.1109\/MMSP.1998.738950"},{"key":"10.1117\/1.1455015_r6","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1117\/12.344706","volume":"3657","author":"Queluz","year":"1999","journal-title":"Proc. SPIE","ISSN":"http:\/\/id.crossref.org\/issn\/0277-786X","issn-type":"print"},{"key":"10.1117\/1.1455015_r7","doi-asserted-by":"crossref","unstructured":"M. Schneider and S.-F. Chang, \u201cA robust content based digital signature for image authentication,\u201d inProceedings of ICIP, pp. 227\u2013230 (1996).","DOI":"10.1109\/ICIP.1996.560425"},{"key":"10.1117\/1.1455015_r8","doi-asserted-by":"crossref","unstructured":"J. Fridrich, \u201cImage watermarking for tamper detection,\u201d inProceedings of ICIP, pp. 404\u2013408 (1998).","DOI":"10.1109\/ICIP.1998.723401"},{"key":"10.1117\/1.1455015_r9","doi-asserted-by":"crossref","unstructured":"D. Kundur and D. Hatzinakos, \u201cTowards a telltale watermarking technique for tamper-proofing,\u201d inProceedings of ICIP,pp. 409\u2013413 (1998).","DOI":"10.1109\/ICIP.1998.723403"},{"key":"10.1117\/1.1455015_r10","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1117\/12.384968","volume":"3971","author":"Lin","year":"2000","journal-title":"Proc. SPIE","ISSN":"http:\/\/id.crossref.org\/issn\/0277-786X","issn-type":"print"},{"key":"10.1117\/1.1455015_r11","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1117\/12.384969","volume":"3971","author":"Lin","year":"2000","journal-title":"Proc. SPIE","ISSN":"http:\/\/id.crossref.org\/issn\/0277-786X","issn-type":"print"},{"key":"10.1117\/1.1455015_r12","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1117\/12.384967","volume":"3971","author":"Marvel","year":"2000","journal-title":"Proc. SPIE","ISSN":"http:\/\/id.crossref.org\/issn\/0277-786X","issn-type":"print"},{"key":"10.1117\/1.1455015_r13","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1117\/12.384966","volume":"3971","author":"Queluz","year":"2000","journal-title":"Proc. SPIE","ISSN":"http:\/\/id.crossref.org\/issn\/0277-786X","issn-type":"print"},{"key":"10.1117\/1.1455015_r14","unstructured":"S. Walton, \u201cImage authentication for a slippery new age,\u201dDr. Dobb\u2019s Journal, pp. 18\u201326 (1995)."},{"key":"10.1117\/1.1455015_r15","unstructured":"P. W. Wong, \u201cA public watermark for image verification and authentication,\u201d inProceedings of ICIP(1998)."},{"key":"10.1117\/1.1455015_r16","unstructured":"M. Wu and B. Liu, \u201cWatermarking for image authentication,\u201d inProceedings of ICIP, pp. 437\u2013441 (1998)."},{"key":"10.1117\/1.1455015_r17","doi-asserted-by":"crossref","unstructured":"M. Yeung and F. Mintzer, \u201cAn invisible watermarking technique for image verification,\u201d inProceedings of ICIP, pp. 680\u2013683 (1997).","DOI":"10.1109\/ICIP.1997.638587"},{"key":"10.1117\/1.1455015_r18","unstructured":"L. Xie and G. Arce, \u201cJoint wavelet compression and authentication watermarking,\u201d inProceedings of ICIP, pp. 427\u2013431 (1998)."},{"key":"10.1117\/1.1455015_r19","unstructured":"J. Zhao and E. Koch, \u201cTowards robust and hidden image copyright labelling,\u201d inProceedings of IEEE Workshop on Nonlinear Signal and Image Processing,Greece (June 20\u201322 1995)."},{"key":"10.1117\/1.1455015_r20","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/PROC.1977.10515","volume":"65","author":"Netravali","year":"1977","journal-title":"Proc. IEEE","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9219","issn-type":"print"}],"container-title":["Journal of Electronic Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?articleid=1097849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T17:15:41Z","timestamp":1581095741000},"score":1,"resource":{"primary":{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?doi=10.1117\/1.1455015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4,1]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,4,1]]}},"URL":"http:\/\/dx.doi.org\/10.1117\/1.1455015","relation":{},"ISSN":["1017-9909"],"issn-type":[{"value":"1017-9909","type":"print"}],"subject":[],"published":{"date-parts":[[2002,4,1]]}}}