{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T05:06:15Z","timestamp":1738904775601,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_20","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"254-263","source":"Crossref","is-referenced-by-count":2,"title":["An Improved Reversible Difference Expansion Watermarking Algorithm"],"prefix":"10.1007","author":[{"given":"Sachnev","family":"Vasiliy","sequence":"first","affiliation":[]},{"given":"Hyoung-Joong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Shijun","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Jeho","family":"Nam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Alattar, A.M.: Reversible watermark using dierence expansion oftriplets. In: Pro-ceedings of the International Conference on Image Processing, vol.\u00a01, pp. 501\u2013504 (2003)","DOI":"10.1109\/ICIP.2003.1247008"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Alattar, A.M.: Reversible watermark using dierence expansion of quads. In: Pro-ceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.\u00a03, pp. 377\u2013380 (2004)","DOI":"10.1109\/ICASSP.2004.1326560"},{"issue":"8","key":"20_CR3","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"A.M. Alattar","year":"2004","unstructured":"Alattar, A.M.: Reversible watermark using the dierence expansion of a generalized integer transform. IEEE Transactions on Image Processing\u00a013(8), 1147\u20131156 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"20_CR4","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1109\/TITB.2005.855556","volume":"9","author":"F. Bao","year":"2005","unstructured":"Bao, F., Deng, R.H., Ooi, B.C., Yang, Y.: Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Transactions on Information Technology in Biomedicine\u00a09(4), 554\u2013563 (2005)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"20_CR5","unstructured":"Barton, J.M.: Method and apparatus for embedding authentication information within digital data, U.S. Patent 5,646,997 (1997)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Pro-ceedings of the International Conference on Image Processing, Rochester, NY, pp. 157\u2013160 (2002)","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, SanJose, CA, pp. 197\u2013208 (2001)","DOI":"10.1117\/12.435400"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding. In: Proceedings of the Information Hiding Workshop, Pittsburgh, PA, pp. 27\u201341 (2001)","DOI":"10.1007\/3-540-45496-9_3"},{"key":"20_CR9","unstructured":"Honsinger, C.W., Jones, P., Rabbani, M.: Lossless recovery of an original image containing embedded data, US Patent 6,278,791B1 (2001)"},{"issue":"12","key":"20_CR10","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L. Kamstra","year":"2005","unstructured":"Kamstra, L., Heijmans, H.J.A.M.: Reversible data embedding into images using wavelet techniques and sorting. IEEE Transactions on Image Processing\u00a014(12), 2082\u20132090 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"key":"20_CR11","unstructured":"Macq, B., Deweyand, F.: Trusted headers for medical images. In: DFG VIII-D II Watermarking Workshop, Erlangen, Germany (1999)"},{"key":"20_CR12","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless image data hiding. In: IEEE International Conference on Multimedia and Expo, Taipei, Taiwn, pp. 2199\u20132202 (2004)"},{"issue":"3","key":"20_CR13","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z. Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE transactions on circuits and systems for video technology\u00a016(3), 354\u2013362 (2006)","journal-title":"IEEE transactions on circuits and systems for video technology"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Thodi, D.M., Rodriguez, J.J.: Reversible watermarking by prediction-error expansion. In: IEEE Southwest Symposium on Image Analysis and Interpretation, LakeTahoe, CA, pp. 21\u201325 (2004)","DOI":"10.1109\/IAI.2004.1300937"},{"issue":"8","key":"20_CR15","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J. Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Transaction on Circuits and Systems for Video Technology\u00a013(8), 890\u2013896 (2003)","journal-title":"IEEE Transaction on Circuits and Systems for Video Technology"},{"issue":"1","key":"20_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"C. Vleeschouwer de","year":"2003","unstructured":"de Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Transactions on Multimedia\u00a05(1), 97\u2013105 (2003)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"25","key":"20_CR17","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1049\/el:20021131","volume":"38","author":"G. Xuan","year":"2002","unstructured":"Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless data hiding based on integer wavelet transform. IEE Electronics Letters\u00a038(25), 1646\u20131648 (2002)","journal-title":"IEE Electronics Letters"},{"key":"20_CR18","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z.C., Chen, J., Yang, C., Zhen, Y., Zheng, J.: High capacity lossless data hiding based on integer wavelet transform. In: Proceedings of IEEE International Conference on Circuits and Systems, Vancouver, Canada (2004)"},{"key":"20_CR19","unstructured":"Xuan, G., Shi, Y.Q.: Integer wavelet transform based lossless data hiding using spread spectrum. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Italy (2004)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Yang, B., Schmucker, M., Funk, W., Busch, C., Sun, S.: Integer DCT-based reversible watermarking for images using companding technique. In: Proceedings of SPIE, vol.\u00a05306, pp. 405\u2013415 (2004)","DOI":"10.1117\/12.527216"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Yang, B., Schmucker, M., Busch, C., Niu, X., Sun, S.: Approaching optimal value expansion for reversible watermarking. In: Proceedings of the 7th workshop on Multimedia and Security, pp. 95\u2013102 (2005)","DOI":"10.1145\/1073170.1073188"},{"key":"20_CR22","unstructured":"Zou, D., Shi, Y.Q., Ni, Z.: A semi-fragile lossless data hiding scheme based on integer wavelet transform. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Italy (2004)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:57:45Z","timestamp":1738821465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}