{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:47:12Z","timestamp":1743050832937,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_36","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T06:04:33Z","timestamp":1229407473000},"page":"467-481","source":"Crossref","is-referenced-by-count":1,"title":["A High Payload VQ Steganographic Method for Binary Images"],"prefix":"10.1007","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[]},{"given":"Chih-Yang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yu-Zheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal on Selected Areas in Communications\u00a016, 474\u2013481 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"36_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/5326.923275","volume":"31","author":"S. Bandyopadhyay","year":"2001","unstructured":"Bandyopadhyay, S., Maulik, U.: Nonparametric genetic clustering: comparison of validity indices. IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews\u00a031(1), 120\u2013125 (2001)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews"},{"issue":"3&4","key":"36_CR3","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035(3&4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"36_CR4","unstructured":"Chang, C.C., Jau, C.C., Chen, T.S.: Chinese calligraphy compression using new S-tree structure. In: Proceedings of International Conference on Chinese Information Processing, Beijing, China, pp. 38\u201347 (1998)"},{"key":"36_CR5","unstructured":"Chang, C.C., Lin, P.Y.: A compression-based data hiding scheme using vector quantization and principle component analysis. In: Proceedings of 2004 International Conference on Cyberworlds, Tokyo, Japan, pp. 369\u2013375 (2004)"},{"issue":"12","key":"36_CR6","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1016\/j.patrec.2004.05.006","volume":"25","author":"C.C. Chang","year":"2004","unstructured":"Chang, C.C., Tseng, H.W.: A steganographic method for digital images using side-match. Pattern Recognition Letters\u00a025(12), 1431\u20131437 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"4","key":"36_CR7","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1049\/ip-vis:20030525","volume":"150","author":"W.C. Du","year":"2003","unstructured":"Du, W.C., Hsu, W.J.: Adaptive data hiding based on VQ compressed images. IEE Proceedings-Vision, Image and Signal Processing\u00a0150(4), 233\u2013238 (2003)","journal-title":"IEE Proceedings-Vision, Image and Signal Processing"},{"key":"36_CR8","volume-title":"Genetic algorithms and engineering optimization","author":"M. Gen","year":"2000","unstructured":"Gen, M., Cheng, R.: Genetic algorithms and engineering optimization. John Wiley & Sons, Inc., Chichester (2000)"},{"key":"36_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3626-0","volume-title":"Vector quantization and signal compression","author":"A. Gersho","year":"1992","unstructured":"Gersho, A., Gray, R.M.: Vector quantization and signal compression. Kluwer Academic Publishers, Dordrecht (1992)"},{"issue":"2","key":"36_CR10","first-page":"4","volume":"1","author":"R.M. Gray","year":"1984","unstructured":"Gray, R.M.: Vector quantization. IEEE Transactions on Acoustics, Speech, and Signal Processing\u00a01(2), 4\u201329 (1984)","journal-title":"IEEE Transactions on Acoustics, Speech, and Signal Processing"},{"issue":"6","key":"36_CR11","first-page":"1054","volume":"E85-D","author":"M. Jo","year":"2002","unstructured":"Jo, M., Kim, H.D.: A digital image watermarking scheme based on vector quantization. IEICE Transactions on Information and Systems\u00a0E85-D (6), 1054\u20131056 (2002)","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"3","key":"36_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1006\/ciun.1994.1018","volume":"59","author":"W.D. Jonge","year":"1994","unstructured":"Jonge, W.D., Scheuermann, P., Schijf, A.: S\u2009+\u2009-Trees: An efficient structure for the representation of large pictures. CVGIP: Image Understanding\u00a059(3), 265\u2013280 (1994)","journal-title":"CVGIP: Image Understanding"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for steganography and digital watermarking. Artech House (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"36_CR14","unstructured":"Lin, Y.C., Wang, C.C.: Digital images watermarking by vector quantization. In: National Computer Symposium, vol.\u00a03, pp. 76\u201387 (1999)"},{"key":"36_CR15","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y. Linde","year":"1980","unstructured":"Linde, Y., Buzo, A., Gary, R.M.: An algorithm for vector quantization design. IEEE Transactions on Communications\u00a028, 84\u201395 (1980)","journal-title":"IEEE Transactions on Communications"},{"issue":"4","key":"36_CR16","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1049\/el:20000309","volume":"36","author":"Z.M. Lu","year":"2000","unstructured":"Lu, Z.M., Sun, S.H.: Digital image watermarking technique based on vector quantization. Electronics Letters\u00a036(4), 303\u2013305 (2000)","journal-title":"Electronics Letters"},{"key":"36_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03315-9","volume-title":"Genetic algorithms + data structures = evolution programs","author":"Z. Michalewicz","year":"1996","unstructured":"Michalewicz, Z.: Genetic algorithms + data structures = evolution programs. Springer, Heidelberg (1996)"},{"issue":"9","key":"36_CR18","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1016\/S0031-3203(99)00137-5","volume":"33","author":"M. Ujjwal","year":"2000","unstructured":"Ujjwal, M., Sanghamitra, B.: Genetic algorithm-based clustering technique. Pattern Recognition\u00a033(9), 1455\u20131465 (2000)","journal-title":"Pattern Recognition"},{"issue":"3","key":"36_CR19","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R.Z. Wang","year":"2001","unstructured":"Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition\u00a034(3), 671\u2013683 (2001)","journal-title":"Pattern Recognition"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:58:15Z","timestamp":1558267095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}