{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:52:32Z","timestamp":1743148352290,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030880064"},{"type":"electronic","value":"9783030880071"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88007-1_18","type":"book-chapter","created":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T23:06:25Z","timestamp":1634857585000},"page":"216-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dual-Layer Barcodes"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6916-5821","authenticated-orcid":false,"given":"Kang","family":"Fu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5424-4284","authenticated-orcid":false,"given":"Jun","family":"Jia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8165-9322","authenticated-orcid":false,"given":"Guangtao","family":"Zhai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,22]]},"reference":[{"key":"18_CR1","unstructured":"Opencv-wechatqrcode. https:\/\/docs.opencv.org\/4.5.2"},{"key":"18_CR2","unstructured":"Zbar bar code reader. http:\/\/zbar.sourceforge.net"},{"key":"18_CR3","unstructured":"Zxing (\u201czebra crossing\u201d) barcode scanning library for java, android. https:\/\/github.com\/zxing\/zxing"},{"issue":"6","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TIFS.2018.2878541","volume":"14","author":"H Fang","year":"2018","unstructured":"Fang, H., Zhang, W., Zhou, H., Cui, H., Yu, N.: Screen-shooting resilient watermarking. IEEE Trans. Inf. Forensics Secur. 14(6), 1403\u20131418 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"18_CR5","doi-asserted-by":"publisher","first-page":"8075","DOI":"10.1007\/s11042-018-6596-y","volume":"78","author":"H Fang","year":"2019","unstructured":"Fang, H., Zhou, H., Ma, Z., Zhang, W., Yu, N.: A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization. Multimedia Tools Appl. 78(7), 8075\u20138089 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"18_CR6","first-page":"1954","volume":"30","author":"J Hayes","year":"2017","unstructured":"Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. Adv. Neural. Inf. Process. Syst. 30, 1954\u20131963 (2017)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR7","unstructured":"Jia, J., et al.: RIHOOP: robust invisible hyperlinks in offline and online photographs. IEEE Trans. Cybern. (2020)"},{"issue":"2","key":"18_CR8","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TIFS.2006.873652","volume":"1","author":"IG Karybali","year":"2006","unstructured":"Karybali, I.G., Berberidis, K.: Efficient spatial image watermarking via new perceptual masking and blind detection schemes. IEEE Trans. Inf. Forensics Secur. 1(2), 256\u2013274 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR9","unstructured":"Morkel, T., Eloff, J.H., Olivier, M.S.: An overview of image steganography. In: ISSA, vol. 1 (2005)"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMM.2003.819759","volume":"6","author":"DP Mukherjee","year":"2004","unstructured":"Mukherjee, D.P., Maitra, S., Acton, S.T.: Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans. Multimedia 6(1), 1\u201315 (2004)","journal-title":"IEEE Trans. Multimedia"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.jss.2017.10.029","volume":"135","author":"A Pramila","year":"2018","unstructured":"Pramila, A., Keskinarkaus, A., Sepp\u00e4nen, T.: Increasing the capturing angle in print-cam robust watermarking. J. Syst. Softw. 135, 205\u2013215 (2018)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"18_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-014-0018-0","volume":"2015","author":"T Qiao","year":"2015","unstructured":"Qiao, T., Retraint, F., Cogranne, R., Zitzmann, C.: Steganalysis of JSteg algorithm using hypothesis testing theory. EURASIP J. Inf. Secur. 2015(1), 1\u201316 (2015)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"8","key":"18_CR13","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.3923\/itj.2010.1725.1738","volume":"9","author":"J Qin","year":"2010","unstructured":"Qin, J., Xiang, X., Wang, M.X.: A review on detection of LSB matching steganography. Inf. Technol. J. 9(8), 1725\u20131738 (2010)","journal-title":"Inf. Technol. J."},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2015","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/978-3-319-77380-3_51","volume-title":"Advances in Multimedia Information Processing \u2013 PCM 2017","author":"H Shi","year":"2018","unstructured":"Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: SSGAN: secure steganography based on generative adversarial networks. In: Zeng, B., Huang, Q., El Saddik, A., Li, H., Jiang, S., Fan, X. (eds.) PCM 2017. LNCS, vol. 10735, pp. 534\u2013544. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-77380-3_51"},{"key":"18_CR16","unstructured":"Sitawarin, C., Bhagoji, A.N., Mosenia, A., Chiang, M., Mittal, P.: DARTS: deceiving autonomous cars with toxic signs. arXiv preprint arXiv:1802.06430 (2018)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Tancik, M., Mildenhall, B., Ng, R.: StegaStamp: invisible hyperlinks in physical photographs. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2117\u20132126 (2020)","DOI":"10.1109\/CVPR42600.2020.00219"},{"issue":"10","key":"18_CR18","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang, W., Tan, S., Li, B., Huang, J.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547\u20131551 (2017)","journal-title":"IEEE Signal Process. Lett."},{"issue":"6","key":"18_CR19","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1109\/TCYB.2013.2245415","volume":"43","author":"H Tian","year":"2013","unstructured":"Tian, H., Zhao, Y., Ni, R., Qin, L., Li, X.: LDFT-based watermarking resilient to local desynchronization attacks. IEEE Trans. Cybern. 43(6), 2190\u20132201 (2013)","journal-title":"IEEE Trans. Cybern."},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86\u201390. IEEE (1994)","DOI":"10.1109\/ICIP.1994.413536"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Volkhonskiy, D., Nazarov, I., Burnaev, E.: Steganographic generative adversarial networks. In: Twelfth International Conference on Machine Vision (ICMV 2019), vol. 11433, p. 114333. International Society for Optics and Photonics (2020)","DOI":"10.1117\/12.2559429"},{"issue":"4","key":"18_CR22","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Wengrowski, E., Dana, K.: Light field messaging with deep photographic steganography. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1515\u20131524 (2019)","DOI":"10.1109\/CVPR.2019.00161"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol. 3, pp. 219\u2013222. IEEE (1996)","DOI":"10.1109\/ICIP.1996.560423"},{"issue":"7","key":"18_CR25","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/j.image.2005.04.001","volume":"20","author":"X Yang","year":"2005","unstructured":"Yang, X., Ling, W., Lu, Z., Ong, E.P., Yao, S.: Just noticeable distortion model and its applications in video coding. Sig. Process. Image Commun. 20(7), 662\u2013680 (2005)","journal-title":"Sig. Process. Image Commun."},{"issue":"9","key":"18_CR26","doi-asserted-by":"publisher","first-page":"4413","DOI":"10.1109\/TIP.2019.2908490","volume":"28","author":"T Yuan","year":"2019","unstructured":"Yuan, T., Wang, Y., Xu, K., Martin, R.R., Hu, S.M.: Two-layer QR codes. IEEE Trans. Image Process. 28(9), 4413\u20134428 (2019). https:\/\/doi.org\/10.1109\/TIP.2019.2908490","journal-title":"IEEE Trans. Image Process."},{"key":"18_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-030-01267-0_40","volume-title":"Computer Vision \u2013 ECCV 2018","author":"J Zhu","year":"2018","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: HiDDeN: hiding data with deep networks. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11219, pp. 682\u2013697. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01267-0_40"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88007-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:10:50Z","timestamp":1725973850000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88007-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030880064","9783030880071"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88007-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"22 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.prcv.cn\/2021\/index_en.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"513","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"201","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"There were 30 oral and 171 poster presentations at the conference.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}