{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:24:56Z","timestamp":1725542696586},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036637"},{"type":"electronic","value":"9783642036644"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03664-4_2","type":"book-chapter","created":{"date-parts":[[2009,12,30]],"date-time":"2009-12-30T13:11:29Z","timestamp":1262178689000},"page":"13-21","source":"Crossref","is-referenced-by-count":2,"title":["A New Covert Image Communication Approach with HVS and GFCM"],"prefix":"10.1007","author":[{"given":"Liyun","family":"Su","sequence":"first","affiliation":[]},{"given":"Fenglan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiaojun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. on Image Processing"},{"issue":"7","key":"2_CR2","doi-asserted-by":"publisher","first-page":"3340","DOI":"10.1109\/TIT.2008.924689","volume":"54","author":"E.-h. Yang","year":"2008","unstructured":"Yang, E.-h., Sun, W.: On information embedding when watermarks and covertexts are correlated. IEEE Transactions on Information Theory\u00a054(7), 3340\u20133345 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"2_CR3","first-page":"16","volume":"7","author":"K.-M. Hung","year":"2008","unstructured":"Hung, K.-M.: A novel robust watermarking technique using int DCT based AC prediction. WSEAS Transactions on Computers\u00a07(1), 16\u201324 (2008)","journal-title":"WSEAS Transactions on Computers"},{"key":"2_CR4","unstructured":"Shifu, T., Hong, M., Enbin, S., Liyun, S.: An adaptive blind scheme for readable watermark based on ALE. In: International conference on Signal processing proceedings, vol.\u00a01, pp. 2982\u20132986 (2006)"},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/TIFS.2005.863499","volume":"1","author":"D. Delannay","year":"2006","unstructured":"Delannay, D., Macq, B.: Watermarking Relying on Cover Signal Content to Hide Synchronization Marks. IEEE Trans. on Information Forensics and Security\u00a01(1), 87\u2013101 (2006)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"issue":"6","key":"2_CR6","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1007\/BF02831844","volume":"11","author":"S. Liyun","year":"2006","unstructured":"Liyun, S., Hong, M., Shifu, T.: Adaptive image digital watermarking with DCT and FCM. WUJNS\u00a011(6), 1657\u20131660 (2006)","journal-title":"WUJNS"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Jian, P., Liyun, S., Zheng, L., Shifu, T.: A novel algorithm of covert image communication with wavelet transform and information fusion. In: International conference on Image and Graphics, vol.\u00a01, pp. 307\u2013312 (2007)","DOI":"10.1109\/ICIG.2007.109"},{"issue":"10","key":"2_CR8","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/5.241504","volume":"81","author":"N.H. Jayant","year":"1993","unstructured":"Jayant, N.H., Nstok, J.: Signal Compression Based on Model of Human Perception. Proceeding of the IEEE\u00a081(10), 1385\u20131422 (1993)","journal-title":"Proceeding of the IEEE"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/TFUZZ.2004.836065","volume":"13","author":"J. Yu","year":"2005","unstructured":"Yu, J., Yang, M.-S.: Optimality Test for Generalized FCM and Its Application to Parameter Selection. IEEE Trans. on Fuzzy Systems\u00a013(1), 164\u2013176 (2005)","journal-title":"IEEE Trans. on Fuzzy Systems"},{"issue":"5","key":"2_CR10","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1109\/TFUZZ.2006.889957","volume":"15","author":"J. Yu","year":"2007","unstructured":"Yu, J., Yang, M.-S.: A Generalized Fuzzy Clustering Regularization Model with Optimality Tests and Model Complexity Analysis. IEEE Trans. on Fuzzy Systems\u00a015(5), 904\u2013915 (2007)","journal-title":"IEEE Trans. on Fuzzy Systems"}],"container-title":["Advances in Intelligent and Soft Computing","Fuzzy Information and Engineering Volume 2"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03664-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T03:43:41Z","timestamp":1557978221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03664-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036637","9783642036644"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03664-4_2","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}