{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:12:29Z","timestamp":1725869549858},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_2","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T03:53:29Z","timestamp":1477886009000},"page":"18-27","source":"Crossref","is-referenced-by-count":0,"title":["Reversible Contrast Enhancement"],"prefix":"10.1007","author":[{"given":"Zhenxing","family":"Qian","sequence":"first","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yimin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"key":"2_CR1","volume-title":"Digital Image Processing","author":"RC Gonzalez","year":"2002","unstructured":"Gonzalez, R.C., Woods, R.: Digital Image Processing. Pearson Education, Upper Saddle River (2002)"},{"issue":"1","key":"2_CR2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1049\/iet-ipr.2014.0321","volume":"9","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Zhang, W.: Semantic image compression based on data hiding. IET Image Proc. 9(1), 54\u201361 (2014)","journal-title":"IET Image Proc."},{"issue":"1","key":"2_CR3","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","volume":"22","author":"H-T Wu","year":"2015","unstructured":"Wu, H.-T., Dugelay, J.-L., Shi, Y.-Q.: Reversible image data hiding with contrast enhancement. IEEE Sig. Process. Lett. 22(1), 81\u201385 (2015)","journal-title":"IEEE Sig. Process. Lett."},{"issue":"11","key":"2_CR4","doi-asserted-by":"crossref","first-page":"2078","DOI":"10.1109\/LSP.2015.2459055","volume":"22","author":"G Gao","year":"2015","unstructured":"Gao, G., Shi, Y.-Q.: Reversible data hiding using controlled contrast enhancement and integer wavelet transform. IEEE Sig. Process. Lett. 22(11), 2078\u20132082 (2015)","journal-title":"IEEE Sig. Process. Lett."},{"issue":"12","key":"2_CR5","doi-asserted-by":"crossref","first-page":"5298","DOI":"10.1109\/TIP.2014.2364537","volume":"23","author":"T Celik","year":"2014","unstructured":"Celik, T.: Spatial entropy-based global and local image contrast enhancement. IEEE Trans. Image Process. 23(12), 5298\u20135308 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"2_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)"},{"issue":"4","key":"2_CR7","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"2_CR8","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/s10851-014-0511-6","volume":"51","author":"B Chen","year":"2015","unstructured":"Chen, B., Shu, H., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.-L.: Color image analysis by quaternion-type moments. J. Math. Imaging Vis. 51(1), 124\u2013144 (2015)","journal-title":"J. Math. Imaging Vis."},{"issue":"8","key":"2_CR9","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283\u20131291 (2014)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:25:06Z","timestamp":1498357506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}