{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:30:06Z","timestamp":1725550206069},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642120893"},{"type":"electronic","value":"9783642120909"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12090-9_8","type":"book-chapter","created":{"date-parts":[[2010,3,15]],"date-time":"2010-03-15T14:44:21Z","timestamp":1268664261000},"page":"89-98","source":"Crossref","is-referenced-by-count":10,"title":["Data Hiding Based on Compressed Dithering Images"],"prefix":"10.1007","author":[{"given":"Cheonshik","family":"Kim","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1109\/83.841536","volume":"9","author":"T.D. Kite","year":"2000","unstructured":"Kite, T.D., Evans, B.L., Bovik, A.C.: Modeling and quality assessment of halftoning by error diffusion. IEEE Trans. Image Processing\u00a09, 909\u2013922 (2000)","journal-title":"IEEE Trans. Image Processing"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1016\/j.sigpro.2007.12.015","volume":"88","author":"J.-M. Guo","year":"2008","unstructured":"Guo, J.-M.: Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning. Signal Processing\u00a088, 1496\u20131510 (2008)","journal-title":"Signal Processing"},{"issue":"4","key":"8_CR3","doi-asserted-by":"crossref","first-page":"615","DOI":"10.15388\/Informatica.2007.197","volume":"18","author":"J.S. Pan","year":"2007","unstructured":"Pan, J.S., Luo, H., Lu, Z.H.: Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images. INFORMATICA\u00a018(4), 615\u2013628 (2007)","journal-title":"INFORMATICA"},{"issue":"2","key":"8_CR4","first-page":"216","volume":"15","author":"S.-F. Tu","year":"2004","unstructured":"Tu, S.-F., Hsu, C.-S.: A BTC-based watermarking scheme for digital images. Information & security\u00a015(2), 216\u2013228 (2004)","journal-title":"Information & security"},{"issue":"3","key":"8_CR5","doi-asserted-by":"crossref","first-page":"419","DOI":"10.15388\/Informatica.2005.108","volume":"16","author":"H.W. Tseng","year":"2005","unstructured":"Tseng, H.W., Chang, C.C.: Hiding data in halftone images. Informatica\u00a016(3), 419\u2013430 (2005)","journal-title":"Informatica"},{"issue":"11","key":"8_CR6","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X. Zhang","year":"2006","unstructured":"Zhang, X., Wang, S.: Efficient Steganographic Embedding by Exploiting Modification Direction. Communications Letters, IEEE\u00a010(11), 781\u2013783 (2006)","journal-title":"Communications Letters, IEEE"},{"key":"8_CR7","first-page":"11","volume":"1","author":"B. Bayer","year":"1973","unstructured":"Bayer, B.: An optimum method for two-level rendition of continuous-tone pictures. IEEE International Conference on Communications\u00a01, 11\u201315 (1973)","journal-title":"IEEE International Conference on Communications"},{"unstructured":"Floyd, R.W., Steinberg, L.: An adaptive algorithm for spatial grey scale. In: Proceedings of the Society of Information Display, vol.\u00a017, pp. 75\u201377 (1976)","key":"8_CR8"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TCOM.1979.1094560","volume":"27","author":"E. Delp","year":"1979","unstructured":"Delp, E., Mitchell, O.: Image Compression Using Block Truncation Coding. IEEE Transactions Communications\u00a027, 1335\u20131342 (1979)","journal-title":"IEEE Transactions Communications"},{"doi-asserted-by":"crossref","unstructured":"Niranjan, D.V., Thomas, D.K., Wilson, S.G., Brian, L.E., Alan, C.B.: Image Quality Assessment Based on a Degradation Model. IEEE Transactions on image processing\u00a09(4) (2000)","key":"8_CR10","DOI":"10.1109\/83.841940"}],"container-title":["Studies in Computational Intelligence","Advances in Intelligent Information and Database Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12090-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:47:46Z","timestamp":1606186066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12090-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642120893","9783642120909"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12090-9_8","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2010]]}}}