{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T18:52:26Z","timestamp":1771008746632,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540427339","type":"print"},{"value":"9783540454960","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_3","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"27-41","source":"Crossref","is-referenced-by-count":172,"title":["Distortion-Free Data Embedding for Images"],"prefix":"10.1007","author":[{"given":"Miroslav","family":"Goljan","sequence":"first","affiliation":[]},{"given":"Jessica J.","family":"Fridrich","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"3_CR1","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California January (2001)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Du, R., Long, M.: Steganalysis of LSB Encoding in Color Images. In: Proc. ICME 2000, New York City, New York, July (2000)","DOI":"10.1109\/ICME.2000.871000"},{"key":"3_CR3","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible Authentication Watermark for JPEG Files. In: Proc. ITCC, Las Vegas, Nevada, April (2001)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Grayscale and Color Images, in preparation for the ACM Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5, 2001.","DOI":"10.1145\/1232454.1232466"},{"key":"3_CR5","unstructured":"Honsinger, C. W., Jones, P., Rabbani, M., Stoffel, J. C: Lossless Recovery of an Original Image Containing Embedded Data. US Patent application, Docket No:77102\/E-D(1999)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Honsinger, C. W.: A Robust Data Hiding Technique Based on Convolution with a Randomized Phase Carrier. In: Proc. of PICS\u201900, Portland, Oregon, March (2000)","DOI":"10.1049\/ic:20000216"},{"key":"3_CR7","unstructured":"Macq, B.: Lossless Multiresolution Transform for Image Authenticating Watermarking. In: Proc. of EUSIPCO, Tampere, Finland, September (2000)"},{"key":"3_CR8","first-page":"87","volume-title":"Introduction to Data Compression","author":"K. Sayood","year":"1996","unstructured":"Sayood, K.: Introduction to Data Compression. Morgan Kaufmann Publishers, San Francisco, California (1996) 87\u201394"},{"key":"3_CR9","unstructured":"Westfeld, A. and Pfitzmann, A.: Attacks on Steganographic Systems. In: Proc. 3rd Information Hiding Workshop, Dresden, Germany, September (1999) 61\u201375"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T02:14:43Z","timestamp":1736993683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}