{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:40:37Z","timestamp":1725550837793},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540305064"},{"type":"electronic","value":"9783540324201"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11590316_77","type":"book-chapter","created":{"date-parts":[[2005,12,6]],"date-time":"2005-12-06T15:18:20Z","timestamp":1133882300000},"page":"491-496","source":"Crossref","is-referenced-by-count":0,"title":["An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera"],"prefix":"10.1007","author":[{"given":"Subhamoy","family":"Maitra","sequence":"first","affiliation":[]},{"given":"Tanmoy Kanti","family":"Das","sequence":"additional","affiliation":[]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"77_CR1","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On The Limits of Steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy Protection\u00a016(4), 474\u2013481 (1998)","journal-title":"IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy Protection"},{"issue":"2","key":"77_CR2","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1109\/TSP.2004.839930","volume":"53","author":"T.K. Das","year":"2005","unstructured":"Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. IEEE Transactions on Signal Processing\u00a053(2), 768\u2013775 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"77_CR3","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, USA (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"77_CR4","volume-title":"The Theory of Error Correcting Codes","author":"F.J. MacWillams","year":"1977","unstructured":"MacWillams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. North Holland, Amsterdam (1977)"},{"key":"77_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-49380-8_4","volume-title":"Information Hiding 1998","author":"L.M. Marvel","year":"1998","unstructured":"Marvel, L.M., Boncelet Jr., C.G., Retter, C.T.: Reliable Blind Information Hiding for Images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 48\u201361. Springer, Heidelberg (1998)"},{"key":"77_CR6","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., Doorn, L.V., Khosla, P.: SWATT: SoftWare-based ATTestation for Embedded Devices. In: IEEE Symposium for Security and Privacy (2004)","DOI":"10.1109\/SECPRI.2004.1301329"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11590316_77.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:50:07Z","timestamp":1619506207000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11590316_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540305064","9783540324201"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/11590316_77","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}