{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:46:34Z","timestamp":1725536794453},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036873"},{"type":"electronic","value":"9783642036880"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_17","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T07:03:43Z","timestamp":1250492623000},"page":"170-183","source":"Crossref","is-referenced-by-count":0,"title":["A Statistical and Iterative Method for Data Hiding in Palette-Based Images"],"prefix":"10.1007","author":[{"given":"Semin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Wesley","family":"De Neve","sequence":"additional","affiliation":[]},{"given":"Yong Man","family":"Ro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/j.patcog.2004.11.006","volume":"38","author":"Y.H. Yu","year":"2005","unstructured":"Yu, Y.H., Chang, C.C., Hu, Y.C.: Hiding secret data in images via predictive coding. Pattern Recognition\u00a038, 691\u2013705 (2005)","journal-title":"Pattern Recognition"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/11582267_23","volume-title":"A Robust Method for Data Hiding in Color Images","author":"M. Ashourian","year":"2005","unstructured":"Ashourian, M., Moallem, P., Ho, Y.S.: A Robust Method for Data Hiding in Color Images. LNCS, vol.\u00a03786, pp. 258\u2013269. Springer, Heidelberg (2005)"},{"issue":"4","key":"17_CR3","first-page":"929","volume":"E87-A","author":"M. Iwata","year":"2004","unstructured":"Iwata, M., Miyake, K., Shiozaki, A.: Digital Steganography Utilizing Features of JPEG Images. IEICE Trans. Fundamentals\u00a0E87-A(4), 929\u2013936 (2004)","journal-title":"IEICE Trans. Fundamentals"},{"key":"17_CR4","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)"},{"issue":"3","key":"17_CR5","first-page":"314","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM Systems Journal\u00a035(3), 314\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"issue":"3","key":"17_CR6","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple substitution. Pattern Recognition\u00a037(3), 489\u2013494 (2004)","journal-title":"Pattern Recognition"},{"issue":"11","key":"17_CR7","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1016\/S0031-3203(03)00221-8","volume":"36","author":"C.C. Thien","year":"2003","unstructured":"Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition\u00a036(11), 2875\u20132881 (2003)","journal-title":"Pattern Recognition"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.amc.2004.04.059","volume":"164","author":"S.J. Wang","year":"2005","unstructured":"Wang, S.J.: Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation\u00a0164, 99\u2013116 (2005)","journal-title":"Applied Mathematics and Computation"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"2674","DOI":"10.1016\/j.patcog.2008.01.019","volume":"41","author":"C.H. Yang","year":"2008","unstructured":"Yang, C.H.: Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognition\u00a041, 2674\u20132683 (2008)","journal-title":"Pattern Recognition"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D.C. Wu","year":"2003","unstructured":"Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition\u00a024, 1613\u20131626 (2003)","journal-title":"Pattern Recognition"},{"issue":"5","key":"17_CR11","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1049\/ip-vis:20059022","volume":"152","author":"H.C. Wu","year":"2005","unstructured":"Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vision Image Signal Process\u00a0152(5), 611\u2013615 (2005)","journal-title":"IEE Proc. Vision Image Signal Process"},{"key":"17_CR12","unstructured":"Machado, R.: EzStego, Stego Online, \n                    \n                      http:\/\/www.fqa.com\/stego_com\/"},{"key":"17_CR13","unstructured":"Fridrich, J.: A new steganographic method for palette-based images. In: PICS 1999: Image Processing, Image Quality, Image Capture System Conference, Savannah, Georgia, USA, vol.\u00a0II, pp. 285\u2013289 (1999)"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.patrec.2003.10.013","volume":"25","author":"M.Y. Wu","year":"2004","unstructured":"Wu, M.Y., Ho, Y.K., Lee, J.H.: An iterative method of palette-based image steganography. Pattern Recognition Letters\u00a025, 301\u2013309 (2004)","journal-title":"Pattern Recognition Letters"},{"key":"17_CR15","unstructured":"Diehard Battery of Tests of Randomness, \n                    \n                      http:\/\/www.stat.fsu.edu\/pub\/diehard\/"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T07:12:22Z","timestamp":1552115542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}