{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:24:23Z","timestamp":1725549863491},"publisher-location":"Berlin, Heidelberg","reference-count":2,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540287919"},{"type":"electronic","value":"9783540319788"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11552055_34","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:50:33Z","timestamp":1127832633000},"page":"280-281","source":"Crossref","is-referenced-by-count":1,"title":["A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents"],"prefix":"10.1007","author":[{"given":"R.","family":"Vill\u00e1n","sequence":"first","affiliation":[]},{"given":"S.","family":"Voloshynovskiy","sequence":"additional","affiliation":[]},{"given":"F.","family":"Deguillaume","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Rytsar","sequence":"additional","affiliation":[]},{"given":"O.","family":"Koval","sequence":"additional","affiliation":[]},{"given":"E.","family":"Topak","sequence":"additional","affiliation":[]},{"given":"E.","family":"Rivera","sequence":"additional","affiliation":[]},{"given":"T.","family":"Pun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","first-page":"19","volume":"9","author":"S. Gel\u2019fand","year":"1980","unstructured":"Gel\u2019fand, S., Pinsker, M.: Coding for channel with random parameters. Problems of Control and Information Theory\u00a09, 19\u201331 (1980)","journal-title":"Problems of Control and Information Theory"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Eggers, J., Su, J., Girod, B.: A blind watermarking scheme based on structured codebooks. In: Secure Images and Image Authentication, IEE Colloquium, London, UK, pp. 4\/1\u20134\/6 (2000)","DOI":"10.1049\/ic:20000215"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11552055_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:01:25Z","timestamp":1619506885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11552055_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540287919","9783540319788"],"references-count":2,"URL":"https:\/\/doi.org\/10.1007\/11552055_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}