{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:03:09Z","timestamp":1725541389958},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642105821"},{"type":"electronic","value":"9783642105838"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10583-8_1","type":"book-chapter","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T09:38:51Z","timestamp":1259055531000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Steganalysis for Reversible Data Hiding"],"prefix":"10.1007","author":[{"given":"Ho Thi Huong","family":"Thom","sequence":"first","affiliation":[]},{"given":"Ho","family":"Van Canh","sequence":"additional","affiliation":[]},{"given":"Trinh Nhat","family":"Tien","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Honsinger, C., Jone, P., Rabbani, M., Stoffel, J.: Lossless recovery of an original image containing embedded data. US Patent: 6,278,791 B1 (2001)"},{"key":"1_CR2","unstructured":"Ni, Z., Shi, Y., Ansari, N., Su, W.: Reversible data hiding. In: Proc. ISCAS, pp. 912\u2013915 (2003)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/978-3-540-30543-9_43","volume-title":"Advances in Multimedia Information Processing - PCM 2004","author":"S.-K. Lee","year":"2004","unstructured":"Lee, S.-K., Suh, Y.-H., Ho, Y.-S.: Lossless Data Hiding Based on Histogram Modification of Difference Images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol.\u00a03333, pp. 340\u2013347. Springer, Heidelberg (2004)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Xuan, G., Zhu, J., Chen, J., Shi, Y., Ni, Z., Su, W.: Distortionless data hiding based on integer wavelet transform. IEEE Electrionics Letters, 1646\u20131648 (2002)","DOI":"10.1049\/el:20021131"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/11922841_26","volume-title":"Digital Watermarking","author":"G. Xuan","year":"2006","unstructured":"Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless Data Hidding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 323\u2013332. Springer, Heidelberg (2006)"},{"key":"1_CR6","unstructured":"CBIR image database, University of Washington, \n                  \n                    http:\/\/www.cs.washington.edu\/research\/imagedatabase\/groundtruth\/"},{"key":"1_CR7","unstructured":"USC-SIPI Image Database, \n                  \n                    http:\/\/sipi.usc.edu\/services\/database\/Database.html"}],"container-title":["Communications in Computer and Information Science","Database Theory and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10583-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T12:18:40Z","timestamp":1552220320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10583-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642105821","9783642105838"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10583-8_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}