{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:10:48Z","timestamp":1744953048956,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319159423"},{"type":"electronic","value":"9783319159430"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15943-0_19","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T10:27:17Z","timestamp":1426501637000},"page":"317-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Lossless Data Hiding for Binary Document Images Using $$n$$-Pairs Pattern"],"prefix":"10.1007","author":[{"given":"Cheonshik","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jinsuk","family":"Baek","sequence":"additional","affiliation":[]},{"given":"Paul S.","family":"Fisher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"issue":"2","key":"19_CR1","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.camwa.2010.01.006","volume":"60","author":"HJ Kim","year":"2010","unstructured":"Kim, H.J., Kim, C., Choi, Y., Wang, S., Zhang, X.: Improved modification direction methods. Comput. Math. Appl. 60(2), 319\u2013325 (2010)","journal-title":"Comput. Math. Appl."},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-22339-6_16","volume":"186","author":"C Kim","year":"2011","unstructured":"Kim, C., Shin, D., Shin, D., Zhang, X.: Improved steganographic embedding exploiting modification direction in multimedia communications. Commun. Comput. Inf. Sci. 186, 130\u2013138 (2011)","journal-title":"Commun. Comput. Inf. Sci."},{"issue":"3","key":"19_CR3","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11042-012-1114-0","volume":"69","author":"C Kim","year":"2014","unstructured":"Kim, C.: Data hiding by an improved exploiting modification direction. Multimedia Tools Appl. 69(3), 569\u2013584 (2014)","journal-title":"Multimedia Tools Appl."},{"key":"19_CR4","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/978-94-017-8798-7_80","volume-title":"Frontier and Innovation in Future Computing and Communications","author":"C Kim","year":"2014","unstructured":"Kim, C., Yang, C.N.: Improving data hiding capacity based on hamming code. In: Park, J.J., Zomaya, A., Jeong, H.-Y., Obaidat, M. (eds.) Frontier and Innovation in Future Computing and Communications. LNEE, pp. 697\u2013706. Springer, The Netherlands (2014)"},{"key":"19_CR5","unstructured":"Baek, J., Kim, C., Fisher, P., Chao, H.: (N, 1) Steganography approach for secret sharing with digital images. In: Proceedings of 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 325\u2013329 (2010)"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1016\/j.csi.2008.09.014","volume":"31","author":"YA Ho","year":"2009","unstructured":"Ho, Y.A., Chan, Y.K., Wu, H.C., Chu, Y.P.: High-capacity reversible data hiding in binary images using pattern substitution. Comput. Stand. Interfaces 31, 787\u2013794 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"11","key":"19_CR7","doi-asserted-by":"publisher","first-page":"1993","DOI":"10.1016\/j.patcog.2005.03.001","volume":"38","author":"CL Tsai","year":"2005","unstructured":"Tsai, C.L., Chiang, H.F., Fan, K.C., Chung, C.D.: Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recogn. 38(11), 1993\u20132006 (2005)","journal-title":"Pattern Recogn."},{"issue":"8","key":"19_CR8","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TCOMM.2002.801488","volume":"50","author":"YC Tseng","year":"2002","unstructured":"Tseng, Y.C., Chen, Y.Y., Pan, H.K.: A secure data hiding scheme for binary images. IEEE Trans. Commun. 50(8), 1227\u20131231 (2002)","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"19_CR9","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Asari, N., Su, W.: Reversible data diding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Chen, M., Wong, E.K., Memon, N., Adams, S.: Recent developments in document image watermarking and data hiding. In: Proceedings of the SPIE Conference 4518: Multimedia Systems and Applications IV, pp. 166\u2013176 (2001)","DOI":"10.1117\/12.448201"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-540-30543-9_43","volume-title":"Advances in Multimedia Information Processing - PCM 2004","author":"S-K Lee","year":"2004","unstructured":"Lee, S.-K., Suh, Y.-H., Ho, Y.-S.: Lossless data hiding based on histogram modification of difference images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3333, pp. 340\u2013347. Springer, Heidelberg (2004)"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"CC Lin","year":"2008","unstructured":"Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn. 41, 3582\u20133591 (2008)","journal-title":"Pattern Recogn."},{"issue":"8","key":"19_CR13","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 89, 1129\u20131143 (2009)","journal-title":"Signal Process."},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/978-3-540-74260-9_64","volume-title":"Image Analysis and Recognition","author":"G Xuan","year":"2007","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible data hiding for JPEG images based on histogram pairs. In: Kamel, M.S., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 715\u2013727. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15943-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T11:08:27Z","timestamp":1674904107000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15943-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319159423","9783319159430"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15943-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}