{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:15:05Z","timestamp":1773148505153,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540210610","type":"print"},{"value":"9783540246244","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_9","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T23:00:52Z","timestamp":1294354852000},"page":"117-128","source":"Crossref","is-referenced-by-count":3,"title":["Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes"],"prefix":"10.1007","author":[{"given":"Yu","family":"Yi","sequence":"first","affiliation":[]},{"given":"Moon Ho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Ji Hyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Gi Yean","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Wolfgang, R.B., Delp, E.J.: Overview of image security techniques with applications in multimedia systems. In: Proceedings of the SPIE International Conference on Multimedia Networks: Security, Displays, Terminals, and Gateways, Dallas, Texas, November 4\u20135, vol.\u00a03228, pp. 297\u2013308 (1997)","DOI":"10.1117\/12.300900"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/5.687830","volume":"86","author":"M.D. Swanson","year":"1998","unstructured":"Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE\u00a086, 1064\u20131087 (1998)","journal-title":"Proceedings of the IEEE"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/3-540-61996-8_42","volume-title":"Information Hiding","author":"J.R. Smith","year":"1996","unstructured":"Smith, J.R., Comiskey, B.O.: Modulation and information hiding in images. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 207\u2013226. Springer, Heidelberg (1996)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"J.I. Cox","year":"1997","unstructured":"Cox, J.I., Kilian, J., Leighton, F.T., Shammon, T.: Secure Spread Spectrum Watermarking for multimedia. IEEE Transactions on Image Processing\u00a06, 1673\u20131686 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"George, M., Chouinard, J.-Y., Georganas, N.: Digital Watermarking of Images and Video using Direct Sequence Spread Spectrum Techniques. In: ICEIC (1999)","DOI":"10.1109\/CCECE.1999.807181"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Piva, A., Barni, M., Bartolini, F., Cappellini, V., De Rosa, A.: Improving the Robustness of Non-additive Watermarks Through Optimum Detection Theory. In: Proceedings of SPIE, vol.\u00a03971 (2000)","DOI":"10.1117\/12.384964"},{"key":"9_CR7","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low Density Parity Check Codes","author":"R.G. Gallager","year":"1963","unstructured":"Gallager, R.G.: Low Density Parity Check Codes. MIT Press, Cambridge (1963)"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/18.748992","volume":"45","author":"D.J.C. Mackay","year":"1999","unstructured":"Mackay, D.J.C.: Good error-correcting codes based on very sparse matrices. IEEE Transaction on Information Theory\u00a045, 399\u2013431 (1999)","journal-title":"IEEE Transaction on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T13:05:33Z","timestamp":1559912733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}