{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:03:48Z","timestamp":1725563028180},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642149313"},{"type":"electronic","value":"9783642149320"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14932-0_27","type":"book-chapter","created":{"date-parts":[[2010,8,14]],"date-time":"2010-08-14T11:40:42Z","timestamp":1281786042000},"page":"213-220","source":"Crossref","is-referenced-by-count":0,"title":["A Reversible Data Hiding Scheme Using Even-Odd Embedding Method"],"prefix":"10.1007","author":[{"given":"Lin","family":"Jia","sequence":"first","affiliation":[]},{"given":"Sang-Ho","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","volume-title":"Digital Watermarking and Steganography","author":"J.C. Ingemar","year":"2007","unstructured":"Ingemar, J.C., Matthew, L.M., Jeffrey, A.B., Jessica, F., Ton, K.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007)"},{"issue":"8","key":"27_CR2","first-page":"1147","volume":"13","author":"M.A. Adnan","year":"2002","unstructured":"Adnan, M.A.: Reversible Watermark using the Difference Expansion of a Generalized Integer Transform. IEEE Transactions on Image Processing\u00a013(8), 1147\u20131156 (2002)","journal-title":"IEEE Transactions on Image Processing"},{"key":"27_CR3","first-page":"185","volume":"2","author":"F. Jessica","year":"2002","unstructured":"Jessica, F.: Lossless Data Embedding-New Paradigm in Digital Watermarking. EURASIP Journal on Applied Signal Processing\u00a02, 185\u2013196 (2002)","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"27_CR4","unstructured":"Mehmet, U.C., Gaurav, S.A., Murat, T., Eli, S.: Reversible Data Hiding. In: Proceedings of the International Conference on Image Processing, vol.\u00a0II, pp. 157\u2013160 (2002)"},{"issue":"8","key":"27_CR5","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"T. Jun","year":"2003","unstructured":"Jun, T.: Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(8), 890\u2013896 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"N. Zhicheng","year":"2006","unstructured":"Zhicheng, N., Yun-Qing, S., Nirwan, A., Wei, S.: Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology\u00a016(3), 354\u2013362 (2006)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"27_CR7","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Proc. SPIE, vol.\u00a0(1), pp. 197\u2013208 (2001)"},{"issue":"2","key":"27_CR8","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"U.C. Mehmet","year":"2005","unstructured":"Mehmet, U.C., Gaurav, S., Ahmet, M.T., Eli, S.: Lossless Generalized-LSB Data Embedding. IEEE Transactions on Image Processing\u00a014(2), 253\u2013266 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"L. Chia-Chen","year":"2008","unstructured":"Chia-Chen, L., Wei-Liang, T., Chin-Chen, C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition\u00a041, 3582\u20133591 (2008)","journal-title":"Pattern Recognition"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1016\/j.jss.2009.05.051","volume":"82","author":"H. Wien","year":"2009","unstructured":"Wien, H., Tung-Shou, C., Chih-Wei, S.: Reversible data hiding for high quality images using modification of prediction errors. The Journal of Systems and Software\u00a082, 1833\u20131842 (2009)","journal-title":"The Journal of Systems and Software"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1016\/j.jss.2009.05.028","volume":"82","author":"K. Duc","year":"2009","unstructured":"Duc, K., Chin-Chen, C.: A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy. The Journal of Systems and Software\u00a082, 1743\u20131752 (2009)","journal-title":"The Journal of Systems and Software"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14932-0_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:59:22Z","timestamp":1606186762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14932-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642149313","9783642149320"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14932-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}