{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:33Z","timestamp":1725574413845},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_42","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T23:00:52Z","timestamp":1294354852000},"page":"518-531","source":"Crossref","is-referenced-by-count":3,"title":["High Quality Perceptual Steganographic Techniques"],"prefix":"10.1007","author":[{"given":"Kisik","family":"Chang","sequence":"first","affiliation":[]},{"given":"Changho","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Wooil","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"Chen, Y.Y., Pan, H.K., Tseng, T.C.: A Secure Data Hiding Scheme for Two- Color Images. In: Proceedings of the Fifth IEEE Symposium on Computers and Communications, pp. 750\u2013755 (2000)"},{"key":"42_CR2","unstructured":"Chang, C.C., Wu, M.N., Hwang, K.F.: High Quality Perceptual Data Hiding Technique for Two-Color Images. In: Proceedings of Pacific Rim Workshop on Digital Steganography 2002, Kitakyushu, Japan, July 11-13, pp. 65\u201370 (2002)"},{"key":"42_CR3","unstructured":"Glaude, D.: SteganoGifPaletteOrder, at \n                    \n                      http:\/\/users.skynet.be\/glu\/sgpo.htm"},{"key":"42_CR4","first-page":"225","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"1992","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, pp. 225\u2013237. Addison-Wesley Publishing Company, Inc., Reading (1992)"},{"key":"42_CR5","unstructured":"Fridrich, J.: A New Steganographic Method for Palette Images. In: IS&T PICS, Savannah, Georgia, April 25-28, pp. 285\u2013289 (1999)"},{"key":"42_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/10719724_4","volume-title":"Information Hiding","author":"J. Fridrich","year":"2000","unstructured":"Fridrich, J., Du, R.: Secure Steganographic Methods for Palette Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 47\u201360. Springer, Heidelberg (2000)"},{"key":"42_CR7","unstructured":"Kawaguchi, E., Eason, R.O.: Principle and Applications of BPCSSteganography. In: Proceedings of SPIE, Multimedia Systems and Applications, vol.\u00a03528, pp. 464\u2013473 (1998)"},{"key":"42_CR8","unstructured":"Kwan, M.: GIF Shuffle, at \n                    \n                      http:\/\/www.darkside.com.au\/gifshuffle\/"},{"key":"42_CR9","unstructured":"Machado, R.: EzStego, at \n                    \n                      http:\/\/www.stego.com\/"},{"key":"42_CR10","unstructured":"Niimi, M., Noda, H., Kawaguchi, E.: An Image Embedding in Image by a Complexity Based Region Segmentation Method. In: International Conference on Image Processing (ICIP 1997), Washington, DC, October 26-29, vol.\u00a03 (1997)"},{"key":"42_CR11","unstructured":"Niimi, M., Eason, R.O., Noda, H., Kawaguchi, E.: A BPCS Steganographic Method for palette-Based Images using Luminance Quasi-Preserving Color Quantization. In: Proceedings of Pacific Rim Workshop on Digital Steganography 2002, July 2002, pp. 84\u201391 (2002)"},{"key":"42_CR12","unstructured":"Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, August 2001, pp. 323\u2013335 (2001)"},{"key":"42_CR13","unstructured":"Test images are available on BPCS at \n                    \n                      http:\/\/www.know.comp.kyutech.ac.jp\/BPCSe\/BPCSe-testimages2.html"},{"key":"42_CR14","first-page":"887","volume-title":"Proceedings of INFOCOM 2001","author":"T.C. Tseng","year":"2001","unstructured":"Tseng, T.C., Pan, H.K.: Secure and Invisible Data Hiding in 2-color Images. In: Proceedings of INFOCOM 2001, vol.\u00a02, pp. 887\u2013896. IEEE, Los Alamitos (2001)"},{"key":"42_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"42_CR16","unstructured":"Wu, M.Y., Lee, J.H.: A Novel Data Embedding Method for Two-Color Facsimile Images. In: Proceedings of International Symposium on Multimedia Information Processing, Chung-Li, Taiwan, R.O.C (December 1998)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:21:27Z","timestamp":1558293687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}