{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:40:07Z","timestamp":1748828407797,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_20","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"239-249","source":"Crossref","is-referenced-by-count":3,"title":["Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation"],"prefix":"10.1007","author":[{"given":"Bingwen","family":"Feng","sequence":"first","affiliation":[]},{"given":"Wei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zhuoqian","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"12","key":"20_CR1","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1109\/JPROC.2005.859599","volume":"93","author":"P Moulin","year":"2005","unstructured":"Moulin, P., KoeTter, R.: Data-hiding codes. Proc. IEEE 93(12), 2083\u20132126 (2005)","journal-title":"Proc. IEEE"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/6046.944472","volume":"3","author":"Q Cheng","year":"2001","unstructured":"Cheng, Q., Huang, T.S.: An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans. Multimedia 3(3), 273\u2013284 (2001)","journal-title":"IEEE Trans. Multimedia"},{"issue":"4","key":"20_CR3","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"HS Malvar","year":"2003","unstructured":"Malvar, H.S., Flor\u00eancio, D.A.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898\u2013905 (2003)","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2006.890309","volume":"2","author":"X Huang","year":"2007","unstructured":"Huang, X., Zhang, B.: Statistically robust detection of multiplicative spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 2(1), 1\u201313 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"20_CR5","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Ourique, F., Licks, V., Jordan, R., P\u00e9rez-Gonz\u00e1lez, F.: Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2005, vol. 2, pp. ii\/797\u2013ii\/800. IEEE (2005)","DOI":"10.1109\/ICASSP.2005.1415525"},{"issue":"6","key":"20_CR7","doi-asserted-by":"publisher","first-page":"1504","DOI":"10.1109\/TIP.2010.2042646","volume":"19","author":"NK Kalantari","year":"2010","unstructured":"Kalantari, N.K., Ahadi, S.M.: A logarithmic quantization index modulation for perceptually better data hiding. IEEE Trans. Image Process. 19(6), 1504\u20131517 (2010)","journal-title":"IEEE Trans. Image Process."},{"issue":"10","key":"20_CR8","doi-asserted-by":"publisher","first-page":"3401","DOI":"10.1109\/TIT.2005.855591","volume":"51","author":"U Erez","year":"2005","unstructured":"Erez, U., Litsyn, S., Zamir, R.: Lattices which are good for (almost) everything. IEEE Trans. Inf. Theory 51(10), 3401\u20133416 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-03688-0_7","volume-title":"Digital Watermarking","author":"D Bardyn","year":"2009","unstructured":"Bardyn, D., Dooms, A., Dams, T., Schelkens, P.: Comparative study of wavelet based lattice QIM techniques and robustness against AWGN and JPEG attacks. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 39\u201353. Springer, Heidelberg (2009)"},{"key":"20_CR10","unstructured":"Sloane, N.J., Conway, J., et al.: Sphere packings, lattices and groups, vol. 290. Springer (1999)"},{"issue":"2","key":"20_CR11","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TIFS.2007.897266","volume":"2","author":"Q Li","year":"2007","unstructured":"Li, Q., Cox, I.J.: Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forensics Secur. 2(2), 127\u2013139 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"20_CR12","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/TIFS.2012.2188797","volume":"7","author":"C Wang","year":"2012","unstructured":"Wang, C., Ni, J., Huang, J.: An informed watermarking scheme using hidden Markov model in the wavelet domain. IEEE Trans. Inf. Forensics Secur. 7(3), 853\u2013867 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"20_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 1\u201314 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Liu, N., Subbalakshmi, K.P.: Nonuniform quantizer design for image data hiding. In: International Conference on Image Processing, vol. 4, pp. 2179\u20132182. IEEE (2004)","DOI":"10.1109\/ICIP.2004.1421528"},{"issue":"6","key":"20_CR15","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/49.29616","volume":"7","author":"GD Forney Jr","year":"1989","unstructured":"Forney Jr., G.D.: Multidimensional constellations. ii. voronoi constellations. IEEE J. Sel. Areas Commun. 7(6), 941\u2013958 (1989)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"20_CR16","unstructured":"Zamir, R., (Shitz), S.S., Erez, U.: Nested linear\/lattice codes for structured multiterminal binning. IEEE Trans. Inf. Theory 48(6), 1250\u20131276 (2002)"},{"issue":"4","key":"20_CR17","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/TIFS.2008.2002938","volume":"1","author":"L Perez-Freire","year":"2006","unstructured":"Perez-Freire, L., Perez-Gonzalez, F., Furon, T., Comesana, P.: Security of lattice-based data hiding against the known message attack. IEEE Trans. Inf. Forensics Secur. 1(4), 593\u2013610 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1109\/18.508838","volume":"42","author":"R Zamir","year":"1996","unstructured":"Zamir, R., Feder, M.: On lattice quantization noise. IEEE Trans. Inf. Theory 42(4), 1152\u20131159 (1996)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-24624-4_21","volume-title":"Digital Watermarking","author":"B Abdel-Aziz","year":"2004","unstructured":"Abdel-Aziz, B., Chouinard, J.-Y.: On perceptual quality of watermarked images \u2013 an experimental approach. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 277\u2013288. Springer, Heidelberg (2004)"},{"issue":"2","key":"20_CR20","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/TIT.2003.822578","volume":"50","author":"P Moulin","year":"2004","unstructured":"Moulin, P., Mihcak, M.K.: The parallel-gaussian watermarking game. IEEE Trans. Inf. Theory 50(2), 272\u2013289 (2004)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:50Z","timestamp":1748827130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}