{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:33:19Z","timestamp":1750206799019,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_29","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"338-349","source":"Crossref","is-referenced-by-count":8,"title":["Hiding Data in Binary Images"],"prefix":"10.1007","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[]},{"given":"Chun-Sen","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Chia-Chen","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"C.C. Chang","year":"2002","unstructured":"Chang, C.C., Chen, T.S., Chung, L.Z.: A Steganographic Method Based upon JPEG and Quantization Table Modification. Information Sciences\u00a0141, 123\u2013138 (2002)","journal-title":"Information Sciences"},{"issue":"6","key":"29_CR2","first-page":"1469","volume":"J83-D2","author":"H. Kobayashi","year":"2000","unstructured":"Kobayashi, H., Noguchi, Y., Kiya, H.: A Method of Embedding Binary Data into JPEG Bitstreams. IEICE Transactions\u00a0J83-D2(6), 1469\u20131476 (2000)","journal-title":"IEICE Transactions"},{"issue":"4","key":"29_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J. Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray-scale Images. IEEE Multimedia\u00a08(4), 22\u201328 (2001)","journal-title":"IEEE Multimedia"},{"issue":"4","key":"29_CR4","first-page":"929","volume":"E87-A","author":"M. Iwata","year":"2004","unstructured":"Iwata, M., Miyake, K., Shiozaki, A.: Digital Steganography Utilizing Features of JPEG Images. IEICE Transactions on Fundamentals\u00a0E87-A(4), 929\u2013936 (2004)","journal-title":"IEICE Transactions on Fundamentals"},{"issue":"5","key":"29_CR5","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/TCOMM.2004.826379","volume":"52","author":"C.H. Tzeng","year":"2004","unstructured":"Tzeng, C.H., Yang, Z.F., Tsai, W.H.: Adaptive Data Hiding in Palette Image by Color Ordering and Mapping with Security Protection. IEEE Transactions on Communications\u00a052(5), 791\u2013800 (2004)","journal-title":"IEEE Transactions on Communications"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Chen, J., Chen, T.S., Cheng, M.W.: A New Data Hiding Scheme in Binary Image. In: Proc. Fifth Int. Symp. on Multimedia Software Engineering. Proceedings, pp. 88\u201393 (2003)","DOI":"10.1109\/MMSE.2003.1254426"},{"key":"29_CR7","unstructured":"Fridrich, J.: A New Steganographic Method for Palette-Based Images. In: Proc. of the IS&T PICS Conference, Savannah, Georgia, April, pp. 285\u2013289 (1998)"},{"issue":"13","key":"29_CR8","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1016\/S0167-8655(02)00122-8","volume":"23","author":"J. Spaulding","year":"2002","unstructured":"Spaulding, J., Noda, H., Shirazi, M.N., Kawaguchi, E.: BPCS Steganography Using EZW Lossy Compressed Images. Pattern Recognition Letters\u00a023(13), 1579\u20131587 (2002)","journal-title":"Pattern Recognition Letters"},{"key":"29_CR9","unstructured":"Zhao, J., Koch, E.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. Int. Conf. Intellectual Property Rights for Information Knowledge, New Techniques, Munich, Germany, pp. 242\u2013251 (1995)"},{"issue":"9","key":"29_CR10","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1016\/S0167-8655(01)00044-7","volume":"22","author":"K.L. Chung","year":"2001","unstructured":"Chung, K.L., Shen, C.H., Chang, L.C.: A Novel SVD- and VQ-based Image Hiding Scheme. Pattern Recognition Letters\u00a022(9), 1051\u20131058 (2001)","journal-title":"Pattern Recognition Letters"},{"issue":"6","key":"29_CR11","first-page":"1054","volume":"E85-D","author":"M. Jo","year":"2002","unstructured":"Jo, M., Kim, H.D.: A Digital Image Watermarking Scheme Based on Vector Quantization. IEICE Transactions on Information and Systems\u00a0E85-D(6), 1054\u20131056 (2002)","journal-title":"IEICE Transactions on Information and Systems"},{"key":"29_CR12","unstructured":"Wu, M.Y., Lee, J.H.: A Novel Data Embedding Method for Two-color Facsimile Images. In: Proc. Int. Symp. on Multimedia Information Processing, Chung-Li, Taiwan, R.O.C (December 1998)"},{"key":"29_CR13","unstructured":"Tsai, P., Hu, Y.C., Chang, C.C.: An Image Hiding Technique Using Block Truncation Coding. In: Proc. of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, pp. 54\u201364 (July 2002)"},{"issue":"3","key":"29_CR14","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R.Z. Wang","year":"2001","unstructured":"Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition\u00a034(3), 671\u2013683 (2001)","journal-title":"Pattern Recognition"},{"issue":"8","key":"29_CR15","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TCOMM.2002.801488","volume":"50","author":"Y.C. Tseng","year":"2002","unstructured":"Tseng, Y.C., Chen, Y.Y., Pan, H.K.: A Secure Data Hiding Scheme for Binary Images. IEEE Transactions on Communications\u00a050(8), 1227\u20131231 (2002)","journal-title":"IEEE Transactions on Communications"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Chen, L.H.: High Capacity Image Steganographic Model. In: Proc. of IEE International Conference on Vision, Image and Signal Processing, vol.\u00a0147(3), pp. 288\u2013294 (2000)","DOI":"10.1049\/ip-vis:20000341"},{"issue":"4","key":"29_CR17","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TMM.2004.830814","volume":"6","author":"M. Wu","year":"2004","unstructured":"Wu, M., Liu, B.: Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia\u00a06(4), 528\u2013538 (2004)","journal-title":"IEEE Transactions on Multimedia"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Lu, H., Kot, A.C., Cheng, J.: Secure data hiding in binary document images for authentication. In: Proc. of the International Symposium on Circuits and Systems (ISCAS 2003), May 25-28, vol.\u00a03, pp. III-806 \u2013 III-809 (2003)","DOI":"10.1109\/ISCAS.2003.1205142"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:00:56Z","timestamp":1740222056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}