{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T05:05:55Z","timestamp":1738904755693,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_15","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"188-202","source":"Crossref","is-referenced-by-count":0,"title":["A General Data Hiding Framework and Multi-level Signature for Binary Images"],"prefix":"10.1007","author":[{"given":"Huijuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Alex C.","family":"Kot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Chen, M., Wong, E.K., Memon, N., Adams, S.: Recent Development in Document Image Watermarking and Data Hiding. In: Proc. SPIE Conf., vol.\u00a04518, pp. 166\u2013176","DOI":"10.1117\/12.448201"},{"issue":"8","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/49.464718","volume":"13","author":"J.K. Brassil","year":"1995","unstructured":"Brassil, J.K., Low, S., Maxemchuk, N.F., O\u2019Gorman, L.: Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Selected Areas in Communications\u00a013(8), 1495\u20131504 (1995)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"7","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/5.771071","volume":"87","author":"J.K. Brassil","year":"1999","unstructured":"Brassil, J.K., Low, S., Maxemchuk, N.F.: Copyright Protection for the Electronic Distribution of Text Documents. Proceedings of the IEEE\u00a087(7), 1181\u20131196 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Chotikakamthorn, N.: Electronic Document Data Hiding Technique using Inter-Character Space. In: The 1998 IEEE Asia-Pacific Conf. on Circuits and Systems, November 1998, pp. 419\u2013422 (1998)","DOI":"10.1109\/APCCAS.1998.743799"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Chotikakamthorn, N.: Document Image Data Hiding Technique Using Character Spacing Width Sequence Coding. In: Proc. of 1999 Int. Conf. on Image Processing, October 1999, vol.\u00a02, pp. 250\u2013254 (1999)","DOI":"10.1109\/ICIP.1999.822894"},{"issue":"12","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/76.974678","volume":"11","author":"D. Huang","year":"2001","unstructured":"Huang, D., Yan, H.: Interword Distance Changes Represented by Sine Waves for Watermarking Text Images. IEEE Trans. on Circuits and Systems for Video Technology\u00a011(12), 1237\u20131245 (2001)","journal-title":"IEEE Trans. on Circuits and Systems for Video Technology"},{"key":"15_CR7","unstructured":"Kim, Y.-W., Moon, K.-A., Oh, I.-S.: A Text Watermarking Algorithm based on Word Classification and Inter-Word Space Statistics. In: Proc. of Seventh Int. Conf. on Document Analysis and Recognition, August 2003, vol.\u00a04, pp. 775\u2013779 (2003)"},{"key":"15_CR8","unstructured":"Yang, H., Kot, A.C.: Text Document Authentication by Integrating Inter Character and Word Spaces Watermarking. In: Proc. of the 2004 IEEE Int. Conf. on Multimedia and Expo (ICME 2004), June 27-30, 2004, vol.\u00a02, pp. 955\u2013958 (2004)"},{"key":"15_CR9","unstructured":"Zou, D., Shi, Y.Q.: Formatted Text Document Data Hiding Robust to Printing, Copying and Scanning. In: Proc. of IEEE Int. Symp. on Circuits and Systems (ISCAS 2005), May 23-26, 2005, vol.\u00a05, pp. 4971\u20134974 (2005)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Amamo, T., Misaki, D.: A Feature Calibration Method for Watermarking of Document Images. In: Proc. 5th Int. Conf. on Document Analysis and Recognition, Bangalore, India, pp. 91\u201394 (1999)","DOI":"10.1109\/ICDAR.1999.791732"},{"key":"15_CR11","unstructured":"Pan, H.-K., Chen, Y.-Y., Tseng, Y.-C.: A Secure Data Hiding Scheme for Two-Color Images. In: Proc. of the Fifth Symp. on Computers and Communications, July 3-6, 2000, pp. 750\u2013755 (2000)"},{"issue":"7","key":"15_CR12","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TC.2002.1017706","volume":"51","author":"Y.C. Tseng","year":"2002","unstructured":"Tseng, Y.C., Pan, H.-K.: Data Hiding in 2-Color Images. IEEE Trans. on Computers\u00a051(7), 873\u2013878 (2002)","journal-title":"IEEE Trans. on Computers"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: IEEE Int. Conf. on Multimedia and Expo., New York, July 30 - August 2, vol.\u00a01, pp. 393\u2013396 (2000)","DOI":"10.1109\/ICME.2000.869623"},{"issue":"4","key":"15_CR14","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TMM.2004.830814","volume":"6","author":"M. Wu","year":"2004","unstructured":"Wu, M., Liu, B.: Data Hiding in Binary Images for Authentication and Annotation. IEEE Trans. on Multimedia\u00a06(4), 528\u2013538 (2004)","journal-title":"IEEE Trans. on Multimedia"},{"key":"15_CR15","unstructured":"Yang, H., Kot, A.C.: Data hiding for Bi-level Documents Using Smoothing Techniques. In: Proc. of the 2004 IEEE Int. Symp. on Cirsuits and Systems (ISCAS 2004), May 23-26, 2004, vol.\u00a05, pp. 692\u2013695 (2004)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Kim, H.Y., de Queiroz, R.L.: A Public-Key Authentication Watermarking for Binary Images. In: Proc. of the IEEE Int. Conf. on Image Processing (ICIP 2004), October 2004, vol.\u00a05, pp. 3459\u20133462 (2004)","DOI":"10.1109\/ICIP.2004.1421859"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Pamboukian, S.V.D., Kim, H.Y., de Queiroz, R.L.: Watermarking JBIG2 Text Region for Image Authentication. In: Proc. of the IEEE Int. Conf. on Image Processing (ICIP 2005), September 11-14, 2005, vol.\u00a02, pp. 1078\u20131081 (2005)","DOI":"10.1109\/ICIP.2005.1530246"},{"key":"15_CR18","unstructured":"Kim, H.Y.: A New Public-Key Authentication Watermarking for Binary Document Images Resistant to Parity Attacks. In: Prof. IEEE Int. Conf. on Image Processing (ICIP 2005), September 11-14, 2005, vol.\u00a02, pp. 1074\u20131077 (2005)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Mei, Q., Wong, E.K., Memon, N.: Data Hiding in Binary Text Document. In: Proceedings of SPIE, vol.\u00a04314, pp. 369\u2013375 (2001)","DOI":"10.1117\/12.435420"},{"key":"15_CR20","unstructured":"Yang, H., Kot, A.C., Liu, J.: Semi-fragile Watermarking for Text Document Images Authentication. In: Proc. of the IEEE Int. Symp. on Circuits and Systems (ISCAS 2005), May 2005, vol.\u00a04, pp. 4002\u20134005 (2005)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Liu, J., Yang, H., Kot, A.C.: Relationships And Unification of Binary Images Data-Hiding Methods. In: Proc. of the IEEE Int. Conf. on Image Processing, vol.\u00a01, pp. 981\u2013984 (2005)","DOI":"10.1109\/ICIP.2005.1529917"},{"key":"15_CR22","unstructured":"Zhao, J., Koch, E.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, August 1995, pp. 1\u201310 (1995)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Hu, S.: Document Image Watermarking Algorithm Based on Neighborhood Pixel Ratio. In: Proc. of the Int. Conf. of Acoustics, Speech, and Signal Processing 2005 (ICASSP 2005), March 18-23, 2005, vol.\u00a02, pp. 841\u2013844 (2005)","DOI":"10.1109\/ICASSP.2005.1415536"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Yang, H., Kot, A.C.: Data Hiding For Text Document Image Authentication by Connectivity-Preserving. In: Proc. of the IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2005), March 18-23, 2005, vol.\u00a02, pp. 505\u2013508 (2005)","DOI":"10.1109\/ICASSP.2005.1415452"},{"issue":"3","key":"15_CR25","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/TMM.2006.887990","volume":"9","author":"H. Yang","year":"2007","unstructured":"Yang, H., Kot, A.C.: Pattern-Based Data Hiding for Binary Image Authentication By Connectivity-Preserving. IEEE Transactions On Multimedia\u00a09(3), 475\u2013486 (2007)","journal-title":"IEEE Transactions On Multimedia"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Pan, G., Wu, Z., Pan, Y.: A Data Hiding Method for Few-Color Images. In: Proc. of the IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2002), May 13-17, 2002, vol.\u00a04, pp. 3469\u20133472 (2002)","DOI":"10.1109\/ICASSP.2002.5745401"},{"issue":"2","key":"15_CR27","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/LSP.2003.821748","volume":"11","author":"H. Lu","year":"2004","unstructured":"Lu, H., Kot, A.C., Shi, Y.Q.: Distance-Reciprocal Distortion Measure for Binary Document Images. IEEE Signal Processing Letters\u00a011(2), 228\u2013231 (2004)","journal-title":"IEEE Signal Processing Letters"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Cheng, J., Kot, A.C.: Objective Distortion Measure for Binary Images. In: IEEE Region 10 Conference TENCON 2004, November 21-24, 2004, vol.\u00a01, pp. 355\u2013358 (2004)","DOI":"10.1109\/TENCON.2004.1414430"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Ho, A.T.S., Puhan, N.B., Marziliano, P., Makur, A., Guan, Y.L.: Perception Based Binary Image Watermarking. In: Proc. of the 2004 Int. Symp. on Circuits and Systems (ISCAS 2004), May 23-26, 2004, vol.\u00a02, pp. 37\u201340 (2004)","DOI":"10.1109\/ISCAS.2004.1329202"},{"key":"15_CR30","unstructured":"Lu, H., Kot, A.C., Cheng, J.: Secure Data Hiding in Binary Images for Authentication. In: Proc. of the 2003 Int. Symp. on Circuits and Systems (ISCAS 2003), May 25-28, 2003, vol.\u00a03, pp. 806\u2013809 (2003)"},{"key":"15_CR31","unstructured":"Hwang, K.-F., Chang, C.-C.: A Run-length Mechanism for Hiding Data into Binary Images. In: Proc. of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, July 2002, pp. 71\u201374 (2002)"},{"key":"15_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/11590316_75","volume-title":"Pattern Recognition and Machine Intelligence","author":"S..S. Agaian","year":"2005","unstructured":"Agaian, S.S., Cherukuri, R.C.: Run length Based Steganography for Binary Images. In: Pal, S.K., Bandyopadhyay, S., Biswas, S. (eds.) PReMI 2005. LNCS, vol.\u00a03776, pp. 481\u2013484. Springer, Heidelberg (2005)"},{"issue":"9","key":"15_CR33","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/LSP.2003.815609","volume":"10","author":"V. Korzhik","year":"2003","unstructured":"Korzhik, V., M.-Luna, G., Marakov, D., Marakova, I.: Watermarking of Binary Messages in Conditions of an Additive Binary Noise Attack. IEEE Signal Processing Letters\u00a010(9), 277\u2013279 (2003)","journal-title":"IEEE Signal Processing Letters"},{"issue":"9","key":"15_CR34","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/LCOMM.2003.815656","volume":"7","author":"C.-H. Tzeng","year":"2003","unstructured":"Tzeng, C.-H., Tsai, W.-H.: A New Approach to Authentication of Binary Images for Multimedia Communication with Distortion Reduction and Security Enhancement. IEEE Communications Letters\u00a07(9), 443\u2013445 (2003)","journal-title":"IEEE Communications Letters"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Liu, T.-H., Chang, L.-W.: An Adaptive Data Hiding Technique for Binary Images. In: Proc. of the 17th Int. Conf. on Pattern Recognition (ICPR 2004), August 23-26, vol.\u00a04, pp. 831\u2013834 (2004)","DOI":"10.1109\/ICPR.2004.1333901"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Kim, H.Y., de Queiroz, R.L.: Alteration-Locating Authentication Watermarking for Binary Images. In: Proc. Int. Workshop on Digital Watermarking, pp. 125\u2013136 (2004)","DOI":"10.1007\/978-3-540-31805-7_11"},{"issue":"12","key":"15_CR37","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/LSP.2006.879829","volume":"13","author":"H. Yang","year":"2006","unstructured":"Yang, H., Kot, A.C.: Binary Image Authentication With Tampering Localization By Embedding Cryptographic Signature and Block Identifier. IEEE Signal Processing Letters\u00a013(12), 741\u2013744 (2006)","journal-title":"IEEE Signal Processing Letters"},{"issue":"10","key":"15_CR38","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on Wet Paper. IEEE Trans. on Signal Processing\u00a053(10), 3923\u20133935 (2005)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Wu, M., Fridrich, J., Goljan, M., Gou, H.: Handling Uneven Embedding Capacity in Binary Images: A Revisit. In: SPIE Conference on Security, Watermarking and Stegonography, San Jose, CA, Proc. of SPIE, January 2005, vol.\u00a05681, pp. 194\u2013205 (2005)","DOI":"10.1117\/12.587379"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Markur, A.: Self-Embedding and Restoration Algorithms for Document Watermark. In: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2005), March 2005, vol.\u00a02, pp. 1133\u20131136 (2005)","DOI":"10.1109\/ICASSP.2005.1415609"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Liu, Y., Mant, J., Wong, E., Low, S.H.: Marking and Detection of Text Documents Using Transform-domain Techniques. In: Proc. of SPIE, Electronic Imaging (EI 1999) Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, vol.\u00a03657, pp. 317\u2013328 (1999)","DOI":"10.1117\/12.344682"},{"key":"15_CR42","unstructured":"Lu, H., Shi, X., Shi, Y.Q., Kot, A.C., Chen, L.: Watermark Embedding in DC Components of DCT for Binary Images. In: 2002 IEEE Workshop on Multimedia Signal Processing, December 9-11, 2002, pp. 300\u2013303 (2002)"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Yang, H., Kot, A.C., Rahardja, S., Jiang, X.: High Capacity Data Hiding for Binary Images in Morphological Wavelet Transform Domain. In: Proc. of the IEEE Int. Conf. on Multimedia & Expo (ICME 2007), July 2-5, 2007, pp. 1239\u20131242 (2007)","DOI":"10.1109\/ICME.2007.4284881"},{"issue":"11","key":"15_CR44","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/83.877211","volume":"9","author":"H.J.A.M. Heijmans","year":"2000","unstructured":"Heijmans, H.J.A.M., Goutsias, J.: Nonlinear Multiresolution Signal Decomposition Schemes-Part II: Morphological Wavelets. IEEE Trans. on Image Processing\u00a09(11), 1897\u20131913 (2000)","journal-title":"IEEE Trans. on Image Processing"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:57:42Z","timestamp":1738821462000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}