{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T14:40:10Z","timestamp":1740840010421,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_39","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"483-496","source":"Crossref","is-referenced-by-count":2,"title":["A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography"],"prefix":"10.1007","author":[{"given":"Mei-Yi","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yu-Kun","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Jia-Hong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Applications of Data Hiding in Digital Images. In: Tutorial for The ISSPA 1999, Brisbane, Australia (August 1999)","DOI":"10.1109\/ISSPA.1999.818099"},{"issue":"10","key":"39_CR2","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1109\/83.718488","volume":"7","author":"T.S. Chen","year":"1998","unstructured":"Chen, T.S., Chang, C.-C., Hwang, M.-S.: A Virtual Image Cryptosystem Based upon Vector Quantization. IEEE Trans. Image Processing\u00a07(10), 1485\u20131488 (1998)","journal-title":"IEEE Trans. Image Processing"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Sandford, M.T., Bradley, J.N., Handel, T.G.: The Data Embedding Method. In: SPIE Photonics East Conference (1995)","DOI":"10.2172\/249252"},{"issue":"3&4","key":"39_CR4","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM System Journal\u00a035(3&4), 313\u2013336 (1996)","journal-title":"IBM System Journal"},{"key":"39_CR5","unstructured":"Hsu, C.-T., Wu, J.-L.: Hidden Signatures in Images. In: Proceedings of ICIP, pp. 223\u2013226 (1996)"},{"issue":"8","key":"39_CR6","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"L.M. Marvel","year":"1999","unstructured":"Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread Spectrum Image Steganography. IEEE Trans. On Image Processing\u00a08(8), 1075\u20131083 (1999)","journal-title":"IEEE Trans. On Image Processing"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. On Image Processing\u00a06, 1673\u20131687 (1997)","journal-title":"IEEE Trans. On Image Processing"},{"issue":"11","key":"39_CR8","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/83.967401","volume":"10","author":"V. Solachidis","year":"2001","unstructured":"Solachidis, V., Pitas, I.: Circularly Symmetric Watermark Embedding in 2-D DFT Domain. IEEE Trans. On Image Processing\u00a010(11), 1741\u20131753 (2001)","journal-title":"IEEE Trans. On Image Processing"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Inoue, H., Miyazaki, A., Yamamoto, A., Katsura, T.: A Digital Watermark Based on Wavelet Transform and Its Robustness on Image Processing. In: Proc. of ICIP, vol.\u00a02, pp. 391\u2013395 (1998)","DOI":"10.1109\/ICIP.1998.723388"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Bas, P., Chassery, J.-M., Davoine, F.: Using the Fractal Code to Watermark Images. In: Proc. of ICIP, vol.\u00a01, pp. 469\u2013473 (1998)","DOI":"10.1109\/ICIP.1998.723532"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Solachidis, V., Boland, F.M.: Phase Watermarking of Digital Images. In: Proc. of ICIP, vol.\u00a03, pp. 239\u2013242 (1996)","DOI":"10.1109\/ICIP.1996.560428"},{"issue":"9","key":"39_CR12","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/TIP.2002.801587","volume":"11","author":"P. Bas","year":"2002","unstructured":"Bas, P., Chassery, J.-M., Macq, B.: Geometrically Invariant Watermarking Using Feature Points. IEEE Trans. On Image Processing\u00a011(9), 1014\u20131028 (2002)","journal-title":"IEEE Trans. On Image Processing"},{"key":"39_CR13","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgran Kaufmann Publishers, San Francisco (2002)"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Johnson, N.F., Jajodia, S.: Exploring steganography: Seeing the Unseen. IEEE Computer, 26\u201334 (February 1998)","DOI":"10.1109\/MC.1998.4655281"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Lee, Y.-K., Chen, L.-H.: High Capacity Image Steganographic Model. In: IEE Proceedings Vision, Image and Signal Processing, vol.\u00a0147(3), pp. 288\u2013294 (2000)","DOI":"10.1049\/ip-vis:20000341"},{"key":"39_CR16","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D.C. Wu","year":"2003","unstructured":"Wu, D.C., Tsai, W.H.: A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters\u00a024, 1613\u20131626 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"39_CR17","unstructured":"Steganography software for Widows, http:\/\/www.jjtc.com\/stegoarchive\/stego\/software.html"},{"key":"39_CR18","unstructured":"Machado, R., Stego, E.Z.: http:\/\/www.stego.com"},{"key":"39_CR19","unstructured":"Fridrich, J.: A New Steganographic Method for Palette-Based Images. In: IS&T PICS, Savannah, Georgia, April 25-28, pp. 285\u2013289 (1999)"},{"key":"39_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/10719724_4","volume-title":"Information Hiding","author":"J. Fridrich","year":"2000","unstructured":"Fridrich, J., Du, R.: Secure Steganographic Methods for Palette Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 47\u201360. Springer, Heidelberg (2000)"},{"key":"39_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201375. Springer, Heidelberg (2000)"},{"key":"39_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"key":"39_CR23","volume-title":"Information Hiding: Steganography and Watermarking-Attacks and Countermeasures","author":"N.F. Johnson","year":"2000","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, Boston (2000)"},{"key":"39_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-49380-8_19","volume-title":"Information Hiding","author":"N.F. Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 273\u2013289. Springer, Heidelberg (1998)"},{"key":"39_CR25","unstructured":"Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet, CITI Technical Report 01\u201311 (2001), http:\/\/www.citi.umich.edu\/techreports\/reports\/citi-tr-01-11.pdf"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:46:47Z","timestamp":1740836807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}