{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:31:10Z","timestamp":1758270670773,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_28","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"337-349","source":"Crossref","is-referenced-by-count":4,"title":["Distortion-Free Robust Reversible Watermarking by Modifying and Recording IWT Means of Image Blocks"],"prefix":"10.1007","author":[{"given":"Shijun","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"28_CR1","unstructured":"Shi, Y.Q., Ni, Z., Zou, D., Liang, C., Xuan, G.: Lossless data hiding: fundamentals, algorithms and applications. In: ISCAS, vol. 2, pp. 313\u2013336. IEEE (2004)"},{"issue":"12","key":"28_CR2","first-page":"3524","volume":"20","author":"X Li","year":"2000","unstructured":"Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20(12), 3524\u20133533 (2000)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"28_CR3","first-page":"161","volume":"2","author":"JB Feng","year":"2006","unstructured":"Feng, J.B., Lin, I.C., Tsai, C.S., Chu, Y.P.: Reversible watermarking: current status and key issues. Int. J. Netw. Secur. 2(3), 161\u2013171 (2006)","journal-title":"Int. J. Netw. Secur."},{"key":"28_CR4","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless image data hiding. In: Mutimedia and Expo, ICME 2004, Taipei, Taiwan, 27\u201330 June, vol. 3, pp. 2199\u20132202 (2004)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"De Vleeschouwer, C., Delaigle, J., Macq, B.: Circular interpretation of histogram for reversible watermarking. In: IEEE Workshop Multimedia, Signal Process, pp. 345\u2013350 (2001)","DOI":"10.1109\/MMSP.2001.962758"},{"issue":"1","key":"28_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"C Vleeschouwer De","year":"2003","unstructured":"De Vleeschouwer, C., Delaigle, J.E., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97\u2013105 (2003)","journal-title":"IEEE Trans. Multimedia"},{"issue":"10","key":"28_CR7","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TCSVT.2006.881857","volume":"16","author":"D Zou","year":"2006","unstructured":"Zou, D., Shi, Y., Ni, Z., Su, W.: A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans. Circ. Syst. Video Technol. 16(10), 1294\u20131300 (2006)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"4","key":"28_CR8","first-page":"890","volume":"18","author":"Z Ni","year":"2008","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans. Circ. Syst. Video Technol. 18(4), 890\u2013896 (2008)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"An, L., Gao, X., Deng, C., Ji, F.: Robust lossless data hiding: analysis and evaluation. In: Proceedings of International Conference on High Perforance Computing and Simulation, pp. 512\u2013516 (2010)","DOI":"10.1109\/HPCS.2010.5547084"},{"issue":"4","key":"28_CR10","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1016\/j.patcog.2009.09.016","volume":"43","author":"XT Zeng","year":"2010","unstructured":"Zeng, X.T., Ping, L.D., Pan, X.Z.: A lossless robust data hiding scheme. Pattern Recogn. 43(4), 1656\u20131667 (2010)","journal-title":"Pattern Recogn."},{"issue":"8","key":"28_CR11","doi-asserted-by":"publisher","first-page":"3598","DOI":"10.1109\/TIP.2012.2191564","volume":"21","author":"L An","year":"2012","unstructured":"An, L., Gao, X., Li, X., Tao, D., Deng, C., Li, J.: Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans. Image Process. 21(8), 3598\u20133611 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Mohammed, R.T., Khoo, B.E.: Robust reversible watermarking scheme based on wavelet-like transform. In: IEEE International Conference on Signal and Image Processing Applications, pp. 354\u2013359(2013)","DOI":"10.1109\/ICSIPA.2013.6708032"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Coltuc, D., Chassery, J.M.: Distortion-free robust watermarking: a case study. In: Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 588\u2013595 (2007)","DOI":"10.1117\/12.702445"},{"issue":"1","key":"28_CR14","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TIP.2011.2162424","volume":"21","author":"D Coltuc","year":"2012","unstructured":"Coltuc, D.: Low distortion transform for reversible watermarking. IEEE Trans. Image Process. 21(1), 412\u2013417 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"28_CR15","unstructured":"CVG-UGR Image Database. http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/index.php"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:52Z","timestamp":1748827132000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}