{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:10:54Z","timestamp":1750824654713,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319641843"},{"type":"electronic","value":"9783319641850"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64185-0_23","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:08:07Z","timestamp":1500970087000},"page":"303-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Improved Reversible Visible Watermarking Based on Adaptive Block Partition"],"prefix":"10.1007","author":[{"given":"Guangyuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Wenfa","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zongming","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"23_CR1","first-page":"134546","volume":"2010","author":"R Caldelli","year":"2010","unstructured":"Caldelli, R., Filippini, F., Becarelli, R.: Reversible watermarking techniques: an overview and a classification. EURASIP J. Inf. Secur. 2010, 134546 (2010)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"4","key":"23_CR2","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"15","author":"MU Celik","year":"2006","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M.: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. 15(4), 1042\u20131049 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"23_CR3","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253\u2013266 (2005)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"23_CR4","doi-asserted-by":"publisher","first-page":"8497","DOI":"10.1007\/s11042-016-3452-9","volume":"76","author":"CC Chen","year":"2017","unstructured":"Chen, C.C., Tsai, Y.H., Yeh, H.C.: Difference-expansion based reversible and visible image watermarking scheme. Multimed. Tools Appl. 76(6), 8497\u20138516 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"23_CR5","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"Coltuc, D.: Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensics Secur. 6(3), 873\u2013882 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR6","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication (2001)"},{"issue":"2","key":"23_CR7","doi-asserted-by":"crossref","first-page":"986842","DOI":"10.1155\/S1110865702000537","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless data embedding-new paradigm in digital watermarking. EURASIP J. Adv. Sig. Process. 2002(2), 986842 (2002)","journal-title":"EURASIP J. Adv. Sig. Process."},{"issue":"11","key":"23_CR8","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/TCSVT.2006.884011","volume":"16","author":"Y Hu","year":"2006","unstructured":"Hu, Y., Jeon, B.: Reversible visible watermarking and lossless recovery of original images. IEEE Trans. Circuits Syst. Video Technol. 16(11), 1423\u20131429 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"6","key":"23_CR9","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li, X., Li, B., Yang, B., Zeng, T.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181\u20132191 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"23_CR10","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2156803","volume":"20","author":"X Li","year":"2011","unstructured":"Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20(12), 3524\u20133533 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"23_CR11","doi-asserted-by":"publisher","first-page":"1224","DOI":"10.1109\/TIP.2010.2040757","volume":"19","author":"TY Liu","year":"2010","unstructured":"Liu, T.Y., Tsai, W.H.: Generic lossless visible watermarking - a new approach. IEEE Trans. Image Process. 19(5), 1224\u20131235 (2010)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"23_CR12","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"23_CR13","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Ni, Z., Zou, D., Liang, C., Xuan, G.: Lossless data hiding: fundamentals, algorithms and applications. In: 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No. 04CH37512), vol. 2, pp. II-33-6, May 2004","DOI":"10.1109\/ISCAS.2004.1329201"},{"issue":"3","key":"23_CR15","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"23_CR16","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"6","key":"23_CR17","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1007\/s11042-013-1714-3","volume":"74","author":"H Yang","year":"2015","unstructured":"Yang, H., Yin, J.: A secure removable visible watermarking for BTC compressed images. Multimedia Tools and Applications 74(6), 1725\u20131739 (2015)","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"23_CR18","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/TCSVT.2009.2017401","volume":"19","author":"Y Yang","year":"2009","unstructured":"Yang, Y., Sun, X., Yang, H., Li, C.T., Xiao, R.: A contrast-sensitive reversible visible image watermarking technique. IEEE Trans. Circuits Syst. Video Technol. 19(5), 656\u2013667 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"23_CR19","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"W Zhang","year":"2013","unstructured":"Zhang, W., Hu, X., Li, X., Yu, N.: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775\u20132785 (2013)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64185-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:44:46Z","timestamp":1750787086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-64185-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319641843","9783319641850"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64185-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"26 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Magdeburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2017.cs.ovgu.de\/cms\/front_content.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}