{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:03:54Z","timestamp":1743073434920,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540653868"},{"type":"electronic","value":"9783540493808"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49380-8_4","type":"book-chapter","created":{"date-parts":[[2007,8,3]],"date-time":"2007-08-03T18:38:00Z","timestamp":1186166280000},"page":"48-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Reliable Blind Information Hiding for Images"],"prefix":"10.1007","author":[{"given":"Lisa M.","family":"Marvel","sequence":"first","affiliation":[]},{"suffix":"Jr","given":"Charles G.","family":"Boncelet","sequence":"additional","affiliation":[]},{"given":"Charles T.","family":"Retter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,11,30]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 1996.","DOI":"10.1147\/sj.353.0313"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"M. Bossert and F. Hergert. Hard-and soft-decision decoding beyond the half minimum distance an algorithm for linear codes. IEEE Transactions on Information Theory, 32(5):709\u2013714, Sep 1986.","DOI":"10.1109\/TIT.1986.1057216"},{"key":"4_CR3","unstructured":"I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-128, NEC Research Institute, Technical Report, August 1995."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, III:243\u2013246, September 1996.","DOI":"10.1109\/ICIP.1996.560429"},{"key":"4_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/3-540-61996-8_47","volume-title":"Information Hiding, First International Workshop","author":"P. Davern","year":"1996","unstructured":"P. Davern and M. Scott. Fractal based image steganography. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 279\u2013294. Springer-Verlag Berlin, 1996."},{"key":"4_CR6","unstructured":"F. Hartung and B. Girod. Fast public-key watermarking of compressed video. Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, CA, October 1997."},{"key":"4_CR7","volume-title":"Fundamentals of Digital Image Processing","author":"A.K. Jain","year":"1989","unstructured":"A.K. Jain. Fundamentals of Digital Image Processing. Prentice-Hall, Inc., Englewood Cliffs, NJ, 1989."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"J.S. Lee. Digital image enhancement and noise filtering by use of local statistics. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2:165\u2013168, March 1980.","DOI":"10.1109\/TPAMI.1980.4766994"},{"key":"4_CR9","unstructured":"R. Machado. Stego, 1997. http:\/\/www.fqa.com\/romana\/romanasoft\/stego.html ."},{"key":"4_CR10","unstructured":"E. Milbrandt. http:\/\/www.members\/iquest.net\/mrmil\/stego.html , October 1997. Steganography Info and Archive."},{"key":"4_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/3-540-61996-8_52","volume-title":"Information Hiding, First International Workshop","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann. Information hiding terminology. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 347\u2013350. Springer-Verlag Berlin, 1996."},{"key":"4_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Information Hiding, First International Workshop","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann. Trials of traced traitors. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 49\u201364. Springer-Verlag Berlin, 1996."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"C.I. Podilchuk and W. Zeng. Digital image watermarking using visual models. In B.E. Rogowitz and T.N. Pappas, editors, Human Vision and Electronic Imaging II, volume 3016, pages 100\u2013111. SPIE, Feb 1997.","DOI":"10.1117\/12.274503"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"C.T. Retter. Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound. Proceedings of the 1995 IEEE International Symposium on Information Theory, Whistler, British Columbia, page 276, Sep 1995.","DOI":"10.1109\/ISIT.1995.535791"},{"key":"4_CR15","volume-title":"Applied Cryptography-Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"B. Schneier. Applied Cryptography-Protocols, Algorithms, and Source Code in C. John Wiley and Sons, Inc., New York, NY, 1996."},{"key":"4_CR16","volume-title":"Spread Sprectrum Communications, Volume I","author":"M.K. Simon","year":"1985","unstructured":"M.K. Simon, J.K. Omura, R.A. Scholtz, and B. K. Levitt. Spread Sprectrum Communications, Volume I. Computer Science Press, Rockville, Maryland, 1985."},{"key":"4_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-61996-8_42","volume-title":"Information Hiding, First International Workshop","author":"J.R. Smith","year":"1996","unstructured":"J.R. Smith and B.O. Comisky. Modulation and information hiding in images. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 207\u2013226. Springer-Verlag, Berlin, 1996."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"M.D. Swanson, B. Zhu, and A.H. Tewfik. Robust data hiding for images. Procedings of the IEEE Digital Signal Processing Workshop, Loen, Norway, pages 37\u201340, September 1996.","DOI":"10.1109\/DSPWS.1996.555454"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"M.D. Swanson, B. Zhu, and A.H. Tewfik. Transparent robust image watermarking. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, III:211\u2013214, September 1996.","DOI":"10.1109\/ICIP.1996.560421"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"K. Tanaka, Y. Nakamura, and K. Matsui. Embedding secret information into a dithered multi-level image. Proceedings of the IEEE Military Communications Conference, Monterey, CA, pages 216\u2013220, 1990.","DOI":"10.1109\/MILCOM.1990.117416"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/ICIP.1994.413536","volume":"2","author":"R. v. Schyndel","year":"1994","unstructured":"R. van Schyndel, A. Tirkel, and C. Osborne. A digital watermark. Proceedings of the IEEE International Conference on Image Processing, 2:86\u201390, 1994.","journal-title":"Proceedings of the IEEE International Conference on Image Processing"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"R.B. Wolfgang and E.J. Delp. A watermark for digital images. Proceedings of the IEEE International Conference on Image Processing Lausanne, Switzerland III:219\u2013222, September 1996.","DOI":"10.1109\/ICIP.1996.560423"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49380-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T03:41:45Z","timestamp":1737344505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49380-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540653868","9783540493808"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-49380-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"30 November 1998","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}