{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:29:48Z","timestamp":1761708588472},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157011"},{"type":"electronic","value":"9783642157028"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15702-8_60","type":"book-chapter","created":{"date-parts":[[2010,9,13]],"date-time":"2010-09-13T06:43:15Z","timestamp":1284360195000},"page":"653-664","source":"Crossref","is-referenced-by-count":18,"title":["A Reversible Data Hiding Scheme for JPEG Images"],"prefix":"10.1007","author":[{"given":"Qiming","family":"Li","sequence":"first","affiliation":[]},{"given":"Yongdong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","volume-title":"Digital Watermarking","author":"I. Cox","year":"2002","unstructured":"Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication watermark for JPEG images. In: International Conference on Information Technology: Coding and Computing, pp. 223\u2013227 (2001)","DOI":"10.1109\/ITCC.2001.918795"},{"key":"60_CR3","first-page":"185","volume":"2","author":"J. Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless data embedding new paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing\u00a02, 185\u2013196 (2002)","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"60_CR4","unstructured":"Honsinger, C., Jones, P., Rabbani, M., Stoffel, J.: Lossless recovery of an original image containing embedded data. US Patent Application, Docket No: 77102\/E-D (1999)"},{"key":"60_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-49380-8_19","volume-title":"Information Hiding","author":"N. Johnson","year":"1998","unstructured":"Johnson, N., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 273\u2013289. Springer, Heidelberg (1998)"},{"key":"60_CR6","unstructured":"Luoa, W., Heilemana, G.L., Pizano, C.E.: Fast and robust watermarking of jpeg files. In: IEEE Symposium on Image Analysis and Inerpretation, pp. 158\u2013162 (2002)"},{"key":"60_CR7","unstructured":"Macq, B.: Lossless multiresolution transform for image authenticating watermarking. In: European signal processing conference, pp. 1973\u20131976 (2000)"},{"issue":"5","key":"60_CR8","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.sigpro.2005.07.033","volume":"86","author":"B.G. Mobasseri","year":"2006","unstructured":"Mobasseri, B.G., Cinalli, D.: Lossless watermarking of compressed media using reversibly decodable packets. Signal Processing\u00a086(5), 951\u2013961 (2006)","journal-title":"Signal Processing"},{"issue":"5","key":"60_CR9","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/LSP.2005.845606","volume":"12","author":"B.G. Mobasseri","year":"2005","unstructured":"Mobasseri, B.G., Berger II, R.J.: A foundation for watermarking in compressed domain. Signal Processing Letters\u00a012(5), 399\u2013402 (2005)","journal-title":"Signal Processing Letters"},{"key":"60_CR10","doi-asserted-by":"crossref","unstructured":"Noguchi, Y., Kobayashi, H., Kiya, H.: A method of extracting embedded binary data from jpeg bitstreams using standard jpeg decoder. In: International Conference on Image Processing, pp. 577\u2013580 (2000)","DOI":"10.1109\/ICIP.2000.901024"},{"issue":"2","key":"60_CR11","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"T. Pevny","year":"2008","unstructured":"Pevny, T., Fridrich, J.: Detection of double-compression in jpeg images for applications in steganography. IEEE Transactions on Information Forensics and Security\u00a03(2), 247\u2013258 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"60_CR12","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J. Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(8), 890\u2013896 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"60_CR13","doi-asserted-by":"crossref","first-page":"127","DOI":"10.15388\/Informatica.2004.050","volume":"15","author":"H.W. Tseng","year":"2004","unstructured":"Tseng, H.W., Chang, C.C.: High capacity data hiding in jpeg-compressed images. Informatica\u00a015(1), 127\u2013142 (2004)","journal-title":"Informatica"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing - PCM 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15702-8_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T13:02:18Z","timestamp":1619787738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15702-8_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157011","9783642157028"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15702-8_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}