{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:35:32Z","timestamp":1762032932269,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_47","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"581-592","source":"Crossref","is-referenced-by-count":11,"title":["Lossless Watermarking Considering the Human Visual System"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Awrangjeb","sequence":"first","affiliation":[]},{"given":"Mohan S.","family":"Kankanhalli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Celik, M.U., Sharma, G., Tekalp, M.A., Saber, E.: Reversible Data Hiding. In: Proceedings of International Conference on Image Processing, Rochester, NY, USA, September 24, vol.\u00a02, pp. 157\u2013160 (2002)","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"47_CR2","unstructured":"Honsinger, C.W., Jones, P.W., Rabbani, M., Stoffel, J.C.: Lossless Recovery of an Original Image Containing Embedded Data. US Patent # 6,278,791 (August 2001)"},{"key":"47_CR3","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. In: Proc. of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, San Jose, California, USA, January 2001, vol.\u00a03971, pp. 197\u2013208 (2001)"},{"key":"47_CR4","first-page":"185","volume":"2","author":"J. Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless Data Embedding \u2013 New Paradigm in Digital Watermarking. Special Issue on Emerging Applications of Multimedia Data Hiding\u00a02, 185\u2013196 (2002)","journal-title":"Special Issue on Emerging Applications of Multimedia Data Hiding"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Tian, J.: Wavelet-based reversible watermarking for authentication. In: Proc. Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002, January 20-25, vol.\u00a04675, pp. 679\u2013690 (2002)","DOI":"10.1117\/12.465329"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Kankanhalli, M.S., Rajmohan, Ramakrishnan, K.R.: Content-based Watermarking of Images. In: Proceedings of 6th ACM International Multimedia Conference, Bristol, UK, September 1998, pp. 61\u201370 (1998)","DOI":"10.1145\/290747.290756"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless Data Embedding for all Image Formats. In: Proc. SPIE Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, California, USA, January 2002, vol.\u00a04675, pp. 572\u2013583 (2002)","DOI":"10.1117\/12.465317"},{"key":"47_CR8","first-page":"77","volume-title":"Introduction to Data Compression","author":"K. Sayood","year":"2000","unstructured":"Sayood, K.: Introduction to Data Compression, 2nd edn., pp. 77\u2013104. Morgan Kaufmann, San Francisco (2000)","edition":"2"},{"key":"47_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-45496-9_3","volume-title":"Information Hiding","author":"M. Goljan","year":"2001","unstructured":"Goljan, M., Fridrich, J., Du, R.: Distortion-free Data Embedding. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 27\u201341. Springer, Heidelberg (2001)"},{"key":"47_CR10","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible Authentication Watermark for JPEG Images. In: Proc. of Information Technology: Coding and Computing, Las Vegas, Nevada, USA, April 2-4, pp. 223\u2013227 (2001)"},{"key":"47_CR11","first-page":"446","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"2002","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn., pp. 446\u2013448. Pearson Education International, Prentice Hall (2002)","edition":"2"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Circular Interpretation of Histogram for Reversible Watermarking. In: IEEE 4th Workshop Multimedia Signal Processing, pp. 345\u2013350 (2001)","DOI":"10.1109\/MMSP.2001.962758"},{"key":"47_CR13","unstructured":"Xuan, G., Chen, J., Zhu, J., Shi, Y.Q., Ni, Z., Su, W.: Lossless Data hiding based on Integer Wavelet Transform. In: IEEE International Workshop on Multimedia Signal Processing, Marriott Beach Resort St. Thomas, US Virgin Islands, December 9-11 (2002)"},{"key":"47_CR14","doi-asserted-by":"crossref","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. In: Proceedings of International Symposium on Circuits and Systems (ISCAS 2003), Bangkok, Thailand, May 25-28, vol.\u00a02, pp. 912\u2013915 (2003)","DOI":"10.1109\/ISCAS.2003.1206123"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Hongmei, L., Zhefeng, Z., Jiwu, H., Xialing, H., Shi, Y.Q.: A High Capacity Distortionfree Data Hiding Algorithm for Palette Image. In: Proceedings of International Symposium on Circuits and Systems (ISCAS 2003), Bangkok, Thailand, May 25-28, vol.\u00a02, pp. 916\u2013919 (2003)","DOI":"10.1109\/ISCAS.2003.1206124"},{"issue":"5","key":"47_CR16","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/83.568923","volume":"6","author":"X. Wu","year":"1997","unstructured":"Wu, X.: Lossless Compression of Continuous-Tone Images via Context Selection, quantization, and modeling. IEEE Transactions on Image Processing\u00a06(5), 656\u2013664 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"key":"47_CR17","first-page":"19","volume-title":"Proceedings of Workshop on Multimedia and Security","author":"J. Tian","year":"2002","unstructured":"Tian, J.: Reversible Watermarking by Difference Expansion. In: Proceedings of Workshop on Multimedia and Security, December 2002, pp. 19\u201322. ACM, Juan-les-Pins (2002)"},{"key":"47_CR18","unstructured":"Macq, B.: Lossless Multiresolution Transform for Image Authenticating Watermarking. In: Proceedings of EUSIPCO, Tempere, Finland (September 2000)"},{"key":"47_CR19","doi-asserted-by":"crossref","unstructured":"Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management. IEEE Transaction on Multimedia (March 2003)","DOI":"10.1109\/TMM.2003.809729"},{"issue":"3-4","key":"47_CR20","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: LU, A.: Techniques for Data Hiding. IBM Systems Journal\u00a035(3-4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"47_CR21","first-page":"106","volume-title":"Introduction to Data Compression","author":"K. Sayood","year":"2000","unstructured":"Sayood, K.: Introduction to Data Compression, 2nd edn., pp. 106\u2013114. Morgan Kaufmann, San Francisco (2000)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:46:47Z","timestamp":1740836807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}