{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:49Z","timestamp":1725557929945},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407973"},{"type":"electronic","value":"9783540452157"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45215-7_31","type":"book-chapter","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T00:27:59Z","timestamp":1277339279000},"page":"360-370","source":"Crossref","is-referenced-by-count":2,"title":["Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation"],"prefix":"10.1007","author":[{"given":"Kaiwen","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shuozhong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"31_CR1","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.: Quantization Index Modulation: a Class of Provably Good Method for Watermarking and Information Embedding. IEEE Transactions on Information Theory\u00a047(4), 1423\u20131443 (2001)","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Chen, B., Wornell, G.: Dither modulation: A New Approach to Digital Watermarking and Information Embedding. In: Proceedings of the SPIE, vol.\u00a03657, pp. 342\u2013353 (1999)","key":"31_CR2","DOI":"10.1117\/12.344684"},{"key":"31_CR3","first-page":"239","volume":"81","author":"J.J. Eggers","year":"2001","unstructured":"Eggers, J.J., Girod, B.: Quantization Effect on Digital Watermarks, Signal Processing\u00a081, 239\u2013263 (2001)","journal-title":"Quantization Effect on Digital Watermarks, Signal Processing"},{"unstructured":"Wang, H., and Wang, S.: Cyber Warfare\u2014 Steganography vs. Steganalysis. Communication of the ACM (in press)","key":"31_CR4"},{"issue":"4","key":"31_CR5","first-page":"398","volume":"41","author":"S. Wang","year":"2002","unstructured":"Wang, S., Zhang, X., Ma, T.: Image Watermarking Using Dither Modulation in Dual- Transform Domain. Journal of the Imaging Society of Japan\u00a041(4), 398\u2013402 (2002)","journal-title":"Journal of the Imaging Society of Japan"},{"key":"31_CR6","volume-title":"Digital Image Processing","author":"W.K. Pratt","year":"1978","unstructured":"Pratt, W.K.: Digital Image Processing, New York. Wiley, Chichester (1978)"},{"key":"31_CR7","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1109\/TCOM.1983.1095893","volume":"31","author":"R. Reininger","year":"1983","unstructured":"Reininger, R., Gibson, J.: Distributions of the Two-Dimensional DCT Coefficients for Images. IEEE Trans. Commun., COM-31, 835\u2013839 (June 1983)","journal-title":"IEEE Trans. Commun., COM-"},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1049\/el:19931288","volume":"29","author":"F. Muller","year":"1993","unstructured":"Muller, F.: Distribution Shape of Two-Dimensional DCT Coefficients of Natural Images. Electronics Letters\u00a029, 1935\u20131936 (1993)","journal-title":"Electronics Letters"},{"doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A.P., et al.: Evaluation of Copyright Marking Systems. In: Proceeding of IEEE Multimedia Systems 1999, Florence, Italy, June 7-11, vol.\u00a01, pp. 574\u2013579 (1999)","key":"31_CR9","DOI":"10.1109\/MMCS.1999.779264"},{"doi-asserted-by":"crossref","unstructured":"Fisk, G., et al.: Eliminating Steganography in Internet Traffic with Active Wardens. In: 5th International Workshop on Information Hiding (2002)","key":"31_CR10","DOI":"10.1007\/3-540-36415-3_2"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45215-7_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T10:56:51Z","timestamp":1559213811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45215-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407973","9783540452157"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45215-7_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}