{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:41:34Z","timestamp":1729633294767,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icme.2011.6011882","type":"proceedings-article","created":{"date-parts":[[2011,9,20]],"date-time":"2011-09-20T16:08:05Z","timestamp":1316534885000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Security evaluation of a perceptual image hashing scheme based on virtual watermark detection"],"prefix":"10.1109","author":[{"given":"Jiantao","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Oscar C.","family":"Au","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptogra-phy"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIFS.2007.902260"},{"key":"ref12","first-page":"928","article-title":"A Study on the Randomness Measure of Image Hashing","volume":"4","author":"zhu","year":"2009","journal-title":"IEEE TIFS"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/LSP.2009.2032451"},{"year":"2003","author":"boyd","journal-title":"Convex optimization","key":"ref14"},{"key":"ref4","first-page":"1825","article-title":"Adaptive Chosen-ciphertext Attack on Secure Arithmetic Coding","volume":"57","author":"zhou","year":"2009","journal-title":"IEEE TSP"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/LSP.2006.884012"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIP.2006.881948"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIFS.2006.873601"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIFS.2007.902670"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TIFS.2005.863502"},{"key":"ref2","first-page":"828","article-title":"Design of Integrated Multimedia Compression and Encryption Systems","volume":"7","author":"wu","year":"2005","journal-title":"IEEE TMM"},{"year":"2005","author":"furht","journal-title":"Multimedia Security Hand-book","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIP.2009.2038637"}],"event":{"name":"2011 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2011,7,11]]},"location":"Barcelona, Spain","end":{"date-parts":[[2011,7,15]]}},"container-title":["2011 IEEE International Conference on Multimedia and Expo"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5997811\/6011826\/06011882.pdf?arnumber=6011882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:39:47Z","timestamp":1497940787000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6011882\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icme.2011.6011882","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}