{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:40:07Z","timestamp":1748828407008,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_21","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"250-258","source":"Crossref","is-referenced-by-count":2,"title":["Self-Embedding Watermarking Scheme Based on MDS Codes"],"prefix":"10.1007","author":[{"given":"Dongmei","family":"Niu","sequence":"first","affiliation":[]},{"given":"Hongxia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Minquan","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Linna","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceeding of IEEE International Conference on Image Processing, pp. 792\u2013796 (1999)","key":"21_CR1","DOI":"10.1109\/ICIP.1999.817228"},{"issue":"2","key":"21_CR2","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1109\/TIFS.2013.2295154","volume":"9","author":"P Korus","year":"2014","unstructured":"Korus, P., Dziech, A.: Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans. Inf. Forensics Secur. 9(2), 1134\u20131147 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"21_CR3","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.sigpro.2009.07.007","volume":"90","author":"CW Yang","year":"2010","unstructured":"Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Signal Process. 90(1), 331\u2013343 (2010)","journal-title":"Signal Process."},{"issue":"7","key":"21_CR4","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1016\/j.optcom.2011.12.044","volume":"285","author":"Y Huo","year":"2012","unstructured":"Huo, Y., He, H., Chen, F.: Alterable capacity fragile watermarking scheme with restoration capability. Opt. Commun. 285(7), 1759\u20131766 (2012)","journal-title":"Opt. Commun."},{"issue":"4","key":"21_CR5","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1016\/j.sigpro.2011.11.013","volume":"92","author":"C Qin","year":"2012","unstructured":"Qin, C., Chang, C.-C., Chen, P.-Y.: Self-embedding fragile water-marking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 92(4), 1137\u20131150 (2012)","journal-title":"Signal Process."},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TIFS.2011.2162950","volume":"7","author":"H He","year":"2012","unstructured":"He, H., Chen, F., Tai, H.M., Kalker, T., Zhang, J.: Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans. Inf. Forensics Secur. 7(1), 185\u2013196 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"21_CR7","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TIFS.2011.2159208","volume":"6","author":"X Zhang","year":"2011","unstructured":"Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223\u20131232 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"21_CR8","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"TY Lee","year":"2008","unstructured":"Lee, T.Y., Lin, S.: Dual watermark for image tampering detection and recovery. Pattern Recogn. 41(11), 3497\u20133506 (2008)","journal-title":"Pattern Recogn."},{"issue":"6","key":"21_CR9","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.compeleceng.2011.09.007","volume":"37","author":"C Li","year":"2011","unstructured":"Li, C., Wang, Y., Ma, B., Zhang, Z.: A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Comput. Electr. Eng. 37(6), 927\u2013940 (2011)","journal-title":"Comput. Electr. Eng."},{"issue":"11","key":"21_CR10","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.3837\/tiis.2013.11.023","volume":"7","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Hsu, T.J.: Effective fragile watermarking for image authentication with high-quality recovery capability. KSII Trans. Internet Inf. Syst. 7(11), 2941\u20132956 (2013)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"4","key":"21_CR11","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1016\/j.sigpro.2012.11.013","volume":"93","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Chen, K.N.: Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process. 93(4), 933\u2013946 (2013)","journal-title":"Signal Process."},{"key":"21_CR12","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/978-3-642-03688-0_24","volume-title":"Digital Watermarking","author":"Xinpeng Zhang","year":"2009","unstructured":"Zhang, X., Wang, S., Feng, S.G.: Fragile watermarking scheme with extensive content restoration capability. In: Proceeding of International Workshop Digital Watermark, pp. 268\u2013278 (2009)"},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TIP.2010.2066981","volume":"20","author":"X Zhang","year":"2011","unstructured":"Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485\u2013495 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"21_CR14","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TMM.2008.2007334","volume":"10","author":"X Zhang","year":"2008","unstructured":"Zhang, X., Wang, S.: Fragile watermarking with error free restoration capability. IEEE Trans. Multimedia 10(8), 1490\u20131499 (2008)","journal-title":"IEEE Trans. Multimedia"},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.sigpro.2008.10.001","volume":"89","author":"X Zhang","year":"2009","unstructured":"Zhang, X., Wang, S.: Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 89(4), 675\u2013679 (2009)","journal-title":"Signal Process."},{"issue":"2","key":"21_CR16","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.dsp.2010.04.006","volume":"21","author":"Z Qian","year":"2011","unstructured":"Qian, Z., Feng, G., Zhang, X., Wang, S.: Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2), 278\u2013286 (2011)","journal-title":"Digit. Signal Process."},{"issue":"3","key":"21_CR17","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1109\/TIP.2012.2227769","volume":"22","author":"P Korus","year":"2013","unstructured":"Korus, P., Dziech, A.: Efficient method for content reconstruction with self-embedding. IEEE Trans. Image Process. 22(3), 1134\u20131147 (2013)","journal-title":"IEEE Trans. Image Process."},{"key":"21_CR18","volume-title":"The Theory of Error Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. North-Holland, Amsterdam (1977)"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:48Z","timestamp":1748827128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}