{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:08:34Z","timestamp":1744902514188},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540423133"},{"type":"electronic","value":"9783540477495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47749-7_34","type":"book-chapter","created":{"date-parts":[[2007,10,20]],"date-time":"2007-10-20T14:57:32Z","timestamp":1192892252000},"page":"427-435","source":"Crossref","is-referenced-by-count":6,"title":["Lossy Compression Tolerant Steganography"],"prefix":"10.1007","author":[{"given":"Ren-Junn","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Timothy K.","family":"Shih","sequence":"additional","affiliation":[]},{"given":"Chuan-Ho","family":"Kao","sequence":"additional","affiliation":[]},{"given":"Tsung-Ming","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,10]]},"reference":[{"unstructured":"The New Testament Revised Standard Version And Chinese Union Version: The Gospel According to Matthew Chapter3, pp. 5\u20137 (1985)..","key":"34_CR1"},{"unstructured":"E. Adelson (1990), \u201cDigital Signal Encoding and Decoding Apparatus,\u201d U.S. Patent, No.4939515.","key":"34_CR2"},{"issue":"s 3 and 4","key":"34_CR3","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"W. Bender, D. Gruhl, N. Morimoto, and A. Lu (1996), \u201cTechniques for Data Hiding,\u201d IBM Systems Journal, Vol. 35,Nos 3 and 4, pp.313\u2013336.","journal-title":"IBM Systems Journal"},{"issue":"10","key":"34_CR4","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1109\/83.718488","volume":"7","author":"T.S. Chen","year":"1998","unstructured":"T.S. Chen, C.C. Chang, and M.S. Hwang (Oct.1998), \u201cVirtual Image Cryptosystem Based upon Vector Quantization,\u201d IEEE Transactions onf Image Processing, Vol. 7,No.10, pp. 1485\u20131488.","journal-title":"IEEE Transactions onf Image Processing"},{"unstructured":"T.S. Chen, and Y.H. Hsu (1997), \u201cImage Camouflage and Encryption Method Using Vector Quantization,\u201d The Second Conference of Information Management and Its Application in Law Enforcement, Taipei, R.O.C., pp. 97\u2013106.","key":"34_CR5"},{"doi-asserted-by":"crossref","unstructured":"I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon (September 1996), \u201cSecure Spread Spectrum Watermarking for Images, Audio and Video,\u201d Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland,,pp.243\u2013246.","key":"34_CR6","DOI":"10.1109\/ICIP.1996.560429"},{"issue":"2","key":"34_CR7","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"N.F. Johnson","year":"1998","unstructured":"N.F. Johnson and S. Jajodia (Feb. 1998), \u201cExploring Steganography: Seeing the Unseen,\u201d IEEE Computer Magazine, Vol. 31,NO. 2, pp.26\u201334.","journal-title":"IEEE Computer Magazine"},{"key":"34_CR8","first-page":"534","volume":"2","author":"M.S. Liaw","year":"1997","unstructured":"M.S. Liaw and L.H. Chen (Nov. 1997), \u201cAn Effective Data Hiding Method,\u201d Proceeding of the Sixth National Conference on Science and Technology of National Defense, Vol. 2, Taoyuan, Taiwan, pp.534\u2013540.","journal-title":"Proceeding of the Sixth National Conference on Science and Technology of National Defense"},{"unstructured":"Lisa M. Marvel, Charles T. Retter and Charles G. Boncelet (1998), \u201cHiding Information in Images,\u201d in Proceedings of ICIP.","key":"34_CR9"}],"container-title":["Lecture Notes in Computer Science","The Human Society and the Internet Internet-Related Socio-Economic Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47749-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T09:15:46Z","timestamp":1550999746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47749-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423133","9783540477495"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-47749-7_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}