{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:42:06Z","timestamp":1761662526241},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540421030"},{"type":"electronic","value":"9783540451167"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45116-1_26","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T17:22:00Z","timestamp":1186420920000},"page":"263-274","source":"Crossref","is-referenced-by-count":29,"title":["SVD-Based Approach to Transparent Embedding Data into Digital Images"],"prefix":"10.1007","author":[{"given":"Vladimir I.","family":"Gorodetski","sequence":"first","affiliation":[]},{"given":"Leonard J.","family":"Popyack","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Samoilov","sequence":"additional","affiliation":[]},{"given":"Victor A.","family":"Skormin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,8]]},"reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Petitcolas, F.A.P.: On the Limits of Steganography. In: IEEE Journal of Selected Areas of Communications, Vol. 16(4) (1998) 474\u2013481","journal-title":"IEEE Journal of Selected Areas of Communications"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TCOM.1976.1093309","volume":"24","author":"H.C. Andrews","year":"1976","unstructured":"Andrews, H.C., Patterson, C.L.: Singular Value Decomposition (SVD) for Image Coding. In: IEEE Transaction on Communication. Vol. 24 (1976) 425\u2013432","journal-title":"IEEE Transaction on Communication"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Bender, W., Gruhl, D., Morimoto, N., and Lu, A.: Techniques for Data Hiding. In: IBM System Journal, Vol. 35(3&4) (1996)","DOI":"10.1147\/sj.353.0313"},{"key":"26_CR4","unstructured":"Bruyndonckx, O., Quisquater, J.J., and Macq, B.: Spatial Method for Copyright Labeling of Digital Images. In: Proceedings of IEEE Workshop on nonlinear signal and image Processing, Greece (1995)"},{"key":"26_CR5","unstructured":"Burget, S., Koch, E., and Zhao, J.: A Novel Method for Copyright Labeling Digitized Image Data. Technical Report, Fraunhofer Institute for Computer Graphics, Germany (1994)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Chen B., and Wornell, G.W.: Dither Modulation: A new Approach to Digital Watermarking and Information Embedding. In: Ping Wah Wong and E.J. Delp (eds). Vol. 3657, San Jose, CA, USA (1999)","DOI":"10.1117\/12.344684"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Cox, I.J. and Miller, M.: A Review on Watermarking and the Importance of Perceptual Modeling. In: Proceedings of the Conference on Electronic Imaging (1997)","DOI":"10.1117\/12.274502"},{"key":"26_CR8","unstructured":"Fridrich, J., Goljan, M.: Protection of Digital Images using self-embedding. In: Proceedings of the Second International Scientific Conference in the Republic of Kaazakhstan \u201cInformation Technologies and Control\u201d, Almaty, Kazakhstan (1999) 302\u2013311"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Fukutomi, T., Tahara, O., Okamoto, N., Minami, T.: Encoding of Still Pictures by a Wavelet Transform and Singular Value Decomposition. In: Proceedings of the 1999 IEEE Canadian Conference on Electrical and Computer Engineering. Alberta (1999) 18\u201323","DOI":"10.1109\/CCECE.1999.807164"},{"key":"26_CR10","unstructured":"Gorodetski, V., Skormin, V., Popyack, L.: Singular Value Decomposition Approach to Digi-tal Image Lossy Compression. In: Proceedings of the 4-th World Conference \u201cSystems, Cybernetics and Informatics-2000\u201d (SCI-2000), Orlando, USA (2000)"},{"key":"26_CR11","unstructured":"Horn, R.A. and Johnson, C.R.: Matrix Analysis. Cambridge University Press (1988)"},{"key":"26_CR12","unstructured":"Johnson, N., Jagodia, S.: Exploring Steganography: Seeing the Unseen. Computer, February (1998) 26\u201334"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Johnson, N., Duric, Z., Jajodia, S.: Information Hiding. Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Pub. (2000)","DOI":"10.1007\/978-1-4615-4375-6"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas F.A.P. (eds): Information Hiding Techniques for Staganography and Digital Watermarking. Artech House Books (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Kundur, D. and Hatzinakos, D.: A robust Digital Watermarking Method using Waveletbased Fusion. In: Proceedings of the International Conference on Image Processing, Vol. 1, USA, IEEE (1997)","DOI":"10.1109\/ICIP.1997.647970"},{"key":"26_CR16","unstructured":"Machado, R.: EZ Stego. http:\/\/www.stego.com ."},{"issue":"1","key":"26_CR17","first-page":"187","volume":"1","author":"K. Matsui","year":"1999","unstructured":"Matsui, K. and Tanaka, K.: Video Steganography: How to Embed a Signature in a Picture. In: Proceedings of IMA Intellectual property, Vol. 1(1) (1999) 187\u2013206.","journal-title":"Proceedings of IMA Intellectual property"},{"issue":"7","key":"26_CR18","first-page":"1062","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J. and Kuhn, M.: Information Hiding-A Survey. In: Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 87(7) (1999) 1062\u20131078","journal-title":"Proceedings of the IEEE, Special Issue on Protection of Multimedia Content"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Pitas, I.: A method for signature casting on digital images. In: Proceedings of the International Conference on Image Processing (ICIP\u201996) (1996)","DOI":"10.1109\/ICIP.1996.560422"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Piva, A, Barni, M., Bartoloni, E., and Cappellini, V.: DCT-based Watermarking Recovering without Restoring to the Uncorrupted Original Image In: Proceedings of the International Conference on Image Processing (ICIP), Vol. 1, IEEE (1997)","DOI":"10.1109\/ICIP.1997.647964"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Podilchuck, C.I. and Zeng, W.: Perceptual Watermarking of Still Images. In: Proceedings of the Workshop on Multimedia Signal Processing, Princeton, NJ, USA (1997)","DOI":"10.1109\/MMSP.1997.602662"},{"key":"26_CR22","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1117\/12.263382","volume":"2915","author":"J. Puate","year":"1996","unstructured":"Puate J. and Jordan F.: Using Fractal Compression Scheme to Embed a Digital Signature into an Image. In: Proceedings of SPIE, Video Techniques and Software for Full-Service Network, Vol. 2915, Boston, MA, USA (1996) 108\u2013118","journal-title":"Proceedings of SPIE, Video Techniques and Software for Full-Service Network"},{"key":"26_CR23","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/BFb0020597","volume":"1174","author":"J.R. Smith","year":"1996","unstructured":"Smith, J.R. and Comiskey, B.O.: Modulation and Information Hiding in Images. In: Lecture Notes in Computer Science; Vol. 1174, Springer Verlag (1996) 207\u2013226","journal-title":"Lecture Notes in Computer Science"},{"issue":"6","key":"26_CR24","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/5.687830","volume":"86","author":"M.D. Swanson","year":"1998","unstructured":"Swanson, M.D., Kobayashi, M. and Tewfic, A.H.: Multimedia Data Embedding and Watermarking Technologies. In: Proceedings of the IEEE, Vol. 86(6) (1998) 1064\u20131087","journal-title":"Proceedings of the IEEE"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Tanaka, K., Nakamura, Y. and Mitsui, K.: Embedding the Attribute Information into a Dithered Image. In: Systems and Computers in Japan, 21(7) (1990)","DOI":"10.1002\/scj.4690210705"},{"key":"26_CR26","first-page":"86","volume":"II","author":"R. Schydel van","year":"1994","unstructured":"van Schydel, R., Tirkel, A. and Osborne, C.: A digital Watermarking. In: Proceedings of ICASSP, Piscataway, NJ, IEEE, Vol. II (1994) 86\u201390","journal-title":"Proceedings of ICASSP"},{"key":"26_CR27","doi-asserted-by":"crossref","first-page":"2713","DOI":"10.1109\/ICASSP.1997.595349","volume":"4","author":"P. Waldemar","year":"1997","unstructured":"Waldemar, P., Ramstad T.: Hibrid KLT-SVD Image Compression. In: Proceedings IEEE International Conference on Acoustics, Speech, and Signal Processing, Germany, IEEE Computer Society Press, Vol. 4 (1997) 2713\u20132716","journal-title":"Proceedings IEEE International Conference on Acoustics, Speech, and Signal Processing"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Xia, X.G., Boncelet, C.G. and Arce, G.R.: A Multi-resolution Watermark for Digital Images. In: Proceedings of International Conference on Image Processing (ICIP), Vol.1, USA, IEEE (1997)","DOI":"10.1109\/ICIP.1997.647971"},{"issue":"8","key":"26_CR29","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/83.403419","volume":"4","author":"J.-F. Yang","year":"1995","unstructured":"Yang, J-F., Lu, C-L.: Combined Techniques of Singular Value Decomposition and Vector Quantization for Image Coding. In: IEEE Transaction on Image Processing, Vol. 4(8) (1995) 1141\u20131146","journal-title":"IEEE Transaction on Image Processing"},{"key":"26_CR30","first-page":"173","volume":"2491","author":"B. Zhu","year":"1995","unstructured":"Zhu, B., Tewfic, A.H. and Gerec, O.: Low Bit Rate Near Transparent Image Coding. In: Proceedings of International Conference on Wavelet Applications for Dual Use, Vol. 2491, Orlando, FL (1995) 173\u2013184","journal-title":"Proceedings of International Conference on Wavelet Applications for Dual Use"}],"container-title":["Lecture Notes in Computer Science","Information Assurance in Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45116-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T18:04:05Z","timestamp":1684001045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45116-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540421030","9783540451167"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-45116-1_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}