{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:21:22Z","timestamp":1742980882908,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_17","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"222-232","source":"Crossref","is-referenced-by-count":0,"title":["Reversible Quantization-Index Modulation Using Neighboring Correlation"],"prefix":"10.1007","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[]},{"given":"Wen-Chuan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Chang, C.C., Wu, W.C.: A Novel Data Hiding Scheme for Keeping High Stego-Image Quality. In: Proceedings of the IEEE 12th International Conference on Multi-Media Modelling, Beijing, China, pp. 225\u2013232 (2006)"},{"issue":"3","key":"17_CR2","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/LSP.2005.862603","volume":"13","author":"R.Z. Wang","year":"2006","unstructured":"Wang, R.Z., Chen, Y.S.: High-Payload Image Steganography Using Two-Way Block Matching. IEEE Signal Processing Letters\u00a013(3), 161\u2013164 (2006)","journal-title":"IEEE Signal Processing Letters"},{"issue":"7","key":"17_CR3","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1016\/S0031-3203(02)00289-3","volume":"36","author":"C.C. Chang","year":"2003","unstructured":"Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding Optimal LSB Substitution in Image Hiding By Dynamic Programming Strategy. Pattern Recognition\u00a036(7), 1583\u20131595 (2003)","journal-title":"Pattern Recognition"},{"issue":"3","key":"17_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding Data in Images by Simple LSB Substitution. Pattern Recognition\u00a037(3), 469\u2013474 (2004)","journal-title":"Pattern Recognition"},{"issue":"8","key":"17_CR5","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J. Tian","year":"2003","unstructured":"Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(8), 890\u2013896 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"M.U. Celik","year":"2005","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. IEEE Transactions on Image Processing\u00a014(2), 253\u2013266 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"17_CR7","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z. Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology\u00a016(3), 354\u2013362 (2006)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"C. Vleeschouwer De","year":"2003","unstructured":"De Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management. IEEE Transactions on Multimedia\u00a05(1), 97\u2013105 (2003)","journal-title":"IEEE Transactions on Multimedia"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Liu, S.H., Chen, T.H., Yao, H.X., Gao, W.: A Variable Depth LSB Data Hiding Technique in Images. In: Proceedings of the IEEE 3rd International Conference on Machine Learning and Cybernetics, Shanghai, China, vol.\u00a07, pp. 3990\u20133994 (2004)","DOI":"10.1109\/ICMLC.2004.1384536"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Tai, W.L., Lin, C.C.: A Reversible Data Hiding Scheme With Modified Side Match Vector Quantization. In: Proceedings of the IEEE 19th International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, vol.\u00a01, pp. 947\u2013952 (2005)","DOI":"10.1109\/AINA.2005.55"},{"key":"17_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3626-0","volume-title":"Vector Quantization and Signal Compression","author":"A. Gersho","year":"1992","unstructured":"Gersho, A., Gray, R.M.: Vector Quantization and Signal Compression. Kluwer Academic Publishers, Boston (1992)"},{"issue":"5","key":"17_CR12","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1049\/ip-vis:20050153","volume":"153","author":"C.C. Chang","year":"2006","unstructured":"Chang, C.C., Wu, W.C.: Hiding Secret Data Adaptively in VQ Index Tables. IEE Proceedings on Vision, Image and Signal Processing\u00a0153(5), 589\u2013597 (2006)","journal-title":"IEE Proceedings on Vision, Image and Signal Processing"},{"issue":"6","key":"17_CR13","first-page":"1054","volume":"E85-D","author":"M. Jo","year":"2002","unstructured":"Jo, M., Kim, H.D.: A Digital Image Watermarking Scheme Based on Vector Quantisation. IEICE Transactions on Information and Systems\u00a0E85-D(6), 1054\u20131056 (2002)","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"4","key":"17_CR14","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1049\/el:20000309","volume":"36","author":"Z.M. Lu","year":"2000","unstructured":"Lu, Z.M., Sun, S.H.: Digital Image Watermarking Technique Based on Vector Quantization. Electronics Letters\u00a036(4), 303\u2013305 (2000)","journal-title":"Electronics Letters"},{"issue":"2","key":"17_CR15","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/83.136594","volume":"1","author":"T. Kim","year":"1992","unstructured":"Kim, T.: Side Match and Overlap Match Vector Quantizers for Images. IEEE Transactions on Image Processing\u00a01(2), 170\u2013185 (1992)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1006\/jvci.1997.0327","volume":"8","author":"C.C. Chang","year":"1997","unstructured":"Chang, C.C., Lin, D.C., Chen, T.S.: An Improved VQ Codebook Search Algorithm Using Principal Component Analysis. Journal of Visual Communication and Image Representation\u00a08(1), 27\u201337 (1997)","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"9","key":"17_CR17","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1093\/ietisy\/e88-d.9.2159","volume":"E88-D","author":"C.C. Chang","year":"2005","unstructured":"Chang, C.C., Wu, W.C.: A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization. IEICE Transactions on Information and Systems\u00a0E88-D(9), 2159\u20132167 (2005)","journal-title":"IEICE Transactions on Information and Systems"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:57:31Z","timestamp":1738821451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}