{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:46:25Z","timestamp":1725536785374},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036873"},{"type":"electronic","value":"9783642036880"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_15","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T07:03:43Z","timestamp":1250492623000},"page":"149-161","source":"Crossref","is-referenced-by-count":0,"title":["High Capacity Data Hiding in Binary Document Images"],"prefix":"10.1007","author":[{"given":"N. B.","family":"Puhan","sequence":"first","affiliation":[]},{"given":"A. T. S.","family":"Ho","sequence":"additional","affiliation":[]},{"given":"F.","family":"Sattar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2001","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers Inc., San Francisco (2001)"},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/26.662643","volume":"46","author":"S.H. Low","year":"1998","unstructured":"Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document Identification for Copyright Protection Using Centroid Detection. IEEE Trans. on Communication\u00a046(3), 372\u2013383 (1998)","journal-title":"IEEE Trans. on Communication"},{"issue":"4","key":"15_CR3","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/49.668978","volume":"16","author":"S.H. Low","year":"1998","unstructured":"Low, S.H., Maxemchuk, N.F.: Performance Comparison of Two Text Marking Methods. IEEE Journal on Selected Areas in Communications\u00a016(4), 561\u2013572 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"7","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/5.771071","volume":"87","author":"J.T. Brassil","year":"1999","unstructured":"Brassil, J.T., Low, S., Maxemchuk, N.F.: Copyright Protection for the Electronic Distribution of Text Documents. Proc. of the IEEE\u00a087(7), 1181\u20131196 (1999)","journal-title":"Proc. of the IEEE"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/3-540-61996-8_43","volume-title":"Information Hiding","author":"J. Brassil","year":"1996","unstructured":"Brassil, J., O\u2019Gorman, L.: Watermarking Document Images with Bounding Box Expansion. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 227\u2013235. Springer, Heidelberg (1996)"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TMM.2004.830814","volume":"6","author":"M. Wu","year":"2004","unstructured":"Wu, M., Liu, B.: Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia\u00a06(4), 528\u2013538 (2004)","journal-title":"IEEE Transactions on Multimedia"},{"key":"15_CR7","unstructured":"Koch, E., Zhao, J.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. International Congress on Intellectual Property Rights for Specialized Information, Knowledge & New Technologies, Vienna (1995)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Mei, Q., Wong, E.K., Memon, N.: Data Hiding in Binary Text Documents. In: Proc. SPIE Security and Watermarking of Multimedia Contents III, San Jose (2001)","DOI":"10.1117\/12.435420"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Amamo, T., Misaki, D.: Feature Calibration Method for Watermarking of Document Images. In: Proc. 5th Int\u2019l Conf on Document Analysis and Recognition, Bangalore, India, pp. 91\u201394 (1999)","DOI":"10.1109\/ICDAR.1999.791732"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Ho, A.T.S., Puhan, N.B., Marziliano, P., Makur, A., Guan, Y.L.: Perception Based Binary Image Watermarking. In: Proc. IEEE International Symposium on Circuits and Systems (ISCAS), Vancouver, Canada, May 2004, vol.\u00a02, pp. 37\u201340 (2004)","DOI":"10.1109\/ISCAS.2004.1329202"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Puhan, N.B., Ho, A.T.S.: Secure Exact Authentication in Binary Document Images. In: Proc. IET Intl. Conference on Visual Information Engineering (VIE), Bangalore, India, September 2006, pp. 29\u201334 (2006)","DOI":"10.1049\/cp:20060497"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Digital Watermarking","author":"H.Y. Kim","year":"2004","unstructured":"Kim, H.Y., de Queiroz, R.L.: Alteration-Locating Authentication Watermarking for Binary Images. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939. Springer, Heidelberg (2004)"},{"issue":"12","key":"15_CR13","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/LSP.2006.879829","volume":"13","author":"H. Yang","year":"2006","unstructured":"Yang, H., Alex, C.K.: Binary Image Authentication with Tampering Localization By Embedding Cryptographic Signature and Block Identifier. IEEE Signal Processing Letters\u00a013(12), 741\u2013744 (2006)","journal-title":"IEEE Signal Processing Letters"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Makur, A.: Self-embedding and Restoration Algorithms for Document Watermark. In: Proc. IEEE International Conference on Acoustics Speech and Signal Processing, vol.\u00a02, pp. 1133\u20131136 (2005)","DOI":"10.1109\/ICASSP.2005.1415609"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T06:43:45Z","timestamp":1685083425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}