{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:23:52Z","timestamp":1743092632299,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644189"},{"type":"electronic","value":"9783319644196"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64419-6_21","type":"book-chapter","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T22:42:00Z","timestamp":1502836920000},"page":"156-164","source":"Crossref","is-referenced-by-count":1,"title":["Mixed Noise Elimination and Data Hiding for\u00a0Secure Data Transmission"],"prefix":"10.1007","author":[{"given":"P.","family":"Mohanakrishnan","sequence":"first","affiliation":[]},{"given":"K.","family":"Suthendran","sequence":"additional","affiliation":[]},{"given":"S.","family":"Arumugam","sequence":"additional","affiliation":[]},{"given":"T.","family":"Panneerselvam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"21_CR1","first-page":"194","volume":"3","author":"SU Rani","year":"2014","unstructured":"Rani, S.U., Jayamma, R.: Reversible records whacking in encrypted images by reserving possibility before encryption. Int. J. Comput. Sci. Mobile Comput. 3, 194\u2013200 (2014)","journal-title":"Int. J. Comput. Sci. Mobile Comput."},{"key":"21_CR2","first-page":"617","volume":"3","author":"R Verma","year":"2013","unstructured":"Verma, R., Ali, D.J.: A comparative study of various types of image noise and efficient noise removal techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 617\u2013622 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"21_CR3","unstructured":"Motwani, M.C., Gadiya, M.C., Motwani, R.C., Harris, F.C.: Survey of image denoising techniques. In: Proceedings of GSPX, pp. 27\u201330 (2004)"},{"key":"21_CR4","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1137\/12087178X","volume":"6","author":"M Yan","year":"2013","unstructured":"Yan, M.: Restoration of images corrupted by impulse noise and mixed Gaussian impulse noise using blind inpainting. SIAM J. Imaging Sci. 6, 1227\u20131245 (2013)","journal-title":"SIAM J. Imaging Sci."},{"key":"21_CR5","doi-asserted-by":"crossref","first-page":"187","DOI":"10.3934\/ipi.2008.2.187","volume":"2","author":"J-F Cai","year":"2008","unstructured":"Cai, J.-F., Chan, R.H., Nikolova, M.: Two-phase approach for deblurring images corrupted by impulse plus Gaussian noise. Inverse Prob. Imaging 2, 187\u2013204 (2008)","journal-title":"Inverse Prob. Imaging"},{"key":"21_CR6","doi-asserted-by":"crossref","first-page":"2307","DOI":"10.1109\/TIP.2010.2047906","volume":"19","author":"C-H Lin","year":"2010","unstructured":"Lin, C.-H., Tsai, J.-S., Chiu, C.-T.: Switching bilateral filter with a texture\/noise detector for universal noise removal. IEEE Trans. Image Process. 19, 2307\u20132320 (2010)","journal-title":"IEEE Trans. Image Process."},{"key":"21_CR7","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1109\/TIP.2012.2227766","volume":"22","author":"J Liu","year":"2013","unstructured":"Liu, J., Tai, X.-C., Huang, H., Huan, Z.: A weighted dictionary learning model for denoising images corrupted by mixed noise. IEEE Trans. Image Process. 22, 1108\u20131120 (2013)","journal-title":"IEEE Trans. Image Process."},{"key":"21_CR8","doi-asserted-by":"crossref","first-page":"1140","DOI":"10.1137\/120885000","volume":"6","author":"J Delon","year":"2013","unstructured":"Delon, J., Desolneux, A.: A patch-based approach for removing impulse or mixed gaussian-impulse noise. SIAM J. Imaging Sci. 6, 1140\u20131174 (2013)","journal-title":"SIAM J. Imaging Sci."},{"key":"21_CR9","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1109\/TSP.2004.833860","volume":"52","author":"M Johnson","year":"2004","unstructured":"Johnson, M., Ishwar, P., Prabhakaran, V., Schonberg, D., Ramchandran, K.: On compressing encrypted data. IEEE Trans. Signal Process. 52, 2992\u20133006 (2004)","journal-title":"IEEE Trans. Signal Process."},{"key":"21_CR10","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16, 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"21_CR11","first-page":"349","volume":"2","author":"M Nosrati","year":"2012","unstructured":"Nosrati, M., Karimi, R., Hariri, M.: Reversible data hiding: principles, techniques, and recent studies. World Appl. Program. 2, 349\u2013353 (2012)","journal-title":"World Appl. Program."},{"key":"21_CR12","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8, 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR13","doi-asserted-by":"crossref","first-page":"2651","DOI":"10.1109\/TIP.2014.2317985","volume":"23","author":"J Jiang","year":"2014","unstructured":"Jiang, J., Zhang, L., Yang, J.: Mixed noise removal by weighted encoding with sparse nonlocal regularization. IEEE Trans. Image Process. 23, 2651\u20132662 (2014)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science and Discrete Mathematics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64419-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T22:47:56Z","timestamp":1508885276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64419-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644189","9783319644196"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64419-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}