{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T04:11:07Z","timestamp":1770351067283,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540248392","type":"print"},{"value":"9783540318057","type":"electronic"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_1","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:26:13Z","timestamp":1267403173000},"page":"1-12","source":"Crossref","is-referenced-by-count":44,"title":["Reversible Data Hiding"],"prefix":"10.1007","author":[{"given":"Yun Q.","family":"Shi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. on Image Processing"},{"issue":"8","key":"1_CR2","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1049\/el:19980545","volume":"34","author":"J. Huang","year":"1998","unstructured":"Huang, J., Shi, Y.Q.: An adaptive image watermarking scheme based on visual masking. Electronics Letters\u00a034(8), 748\u2013750 (1998)","journal-title":"Electronics Letters"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transaction on Information Theory\u00a047(4), 1423\u20131443 (2001)","journal-title":"IEEE Transaction on Information Theory"},{"key":"1_CR4","first-page":"646","volume":"5","author":"J.M. Barton","year":"1997","unstructured":"Barton, J.M.: Method and apparatus for embedding authentication information within digital data. U.S. Patent\u00a05, 646, 997 (1997)","journal-title":"U.S. Patent"},{"key":"1_CR5","first-page":"278","volume":"6","author":"C.W. Honsinger","year":"2001","unstructured":"Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent\u00a06, 278,791 (2001)","journal-title":"US Patent"},{"key":"1_CR6","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"2001","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice Hall, Upper Saddle River (2001)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, January 2001, pp. 197\u2013208 (2001)","DOI":"10.1117\/12.435400"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible Authentication Watermark for JPEG Images. In: Proc. IEEE ITCC 2001, Las Vegas, Nevada, April 2001, pp. 223\u2013227 (2001)","DOI":"10.1109\/ITCC.2001.918795"},{"key":"1_CR9","unstructured":"Fridrich, J., Du, R.: Lossless Authentication of MPEG-2 Video. In: Proc. IEEE ICIP 2002, Rochester, NY (2002)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding. In: Proceedings of 4th Information Hiding Workshop, Pittsburgh, PA, April 2001, pp. 27\u201341 (2001)","DOI":"10.1007\/3-540-45496-9_3"},{"issue":"25","key":"1_CR11","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1049\/el:20021131","volume":"38","author":"G. Xuan","year":"2002","unstructured":"Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless Data Hiding Based on Integer Wavelet Transform. IEE journal, ELECTRONICS LETTERS\u00a038(25), 1646\u20131648 (2002)","journal-title":"IEE journal, ELECTRONICS LETTERS"},{"key":"1_CR12","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z.C., Chen, J., Yang, C., Zhen, Y., Zhen, J.: High capacity lossless data hiding based on integer wavelet transform. In: IEEE International Symposium on Circuits and Systems, Vancouver, Canada (May 2004)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proceedings of the International Conference on Image Processing 2002, Rochester, NY (September 2002)","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"1_CR14","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. In: IEEE International Symposium on Circuits and Systems, Bangkok, Thailand (May 2003)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Transaction on Circuits and Systems for Video Technology\u00a013(8) (August 2003)","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"1_CR16","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z.: Lossless data hiding using integer wavelet transform and spread spectrum. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Italy (September 2004)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Yang, B., Schmucker, M., Funk, W., Busch, C., Sun, S.: Integer DCT-based reversible watermarking for images using companding technique. In: Proceedings of SPIE, January 2004, vol.\u00a05306 (2004)","DOI":"10.1117\/12.527216"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-31805-7_1","volume-title":"Digital Watermarking","author":"G. Xuan","year":"2005","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z.: Reversible data hiding using integer wavelet transform and companding technique. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol.\u00a03304, pp. 1\u201312. Springer, Heidelberg (2005)"},{"key":"1_CR19","unstructured":"Zhang, Z., Sun, Q., Lin, X., Shi, Y.Q., Ni, Z.: A unified authentication framework for JPEG 2000 images. In: IEEE International Conference and Expo., Taipei, Taiwan (June 2004)"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"C. Vleeschouwer De","year":"2003","unstructured":"De Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Tran. Multimedia\u00a05, 97\u2013105 (2003)","journal-title":"IEEE Tran. Multimedia"},{"issue":"s","key":"1_CR21","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Mprimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035(3,4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"1_CR22","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless data hiding. In: IEEE International Conference and Expo., Taipei, Taiwan (June 2004)"},{"key":"1_CR23","unstructured":"Zou, D., Shi, Y.Q., Ni, Z.: lossless data hiding. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Italy (September 2004)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Thodi, M., Rodr\u00edguez, J.J.: Reversible watermarking by prediction-error expansion. In: Proceedings of 6th IEEE Southwest Symposium on Image Analysis and Interpretation, Lake Tahoe, CA, USA, March 28-30, pp. 21\u201325 (2004)","DOI":"10.1109\/IAI.2004.1300937"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T22:26:00Z","timestamp":1739917560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}