{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T08:10:59Z","timestamp":1741248659521,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219832"},{"type":"electronic","value":"9783642219849"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21984-9_65","type":"book-chapter","created":{"date-parts":[[2011,6,17]],"date-time":"2011-06-17T18:10:21Z","timestamp":1308334221000},"page":"787-801","source":"Crossref","is-referenced-by-count":1,"title":["New Data Hiding Method Based on Neighboring Correlation of Blocked Image"],"prefix":"10.1007","author":[{"given":"Mona","family":"Nafari","sequence":"first","affiliation":[]},{"given":"Gholam Hossein","family":"Sheisi","sequence":"additional","affiliation":[]},{"given":"Mansour Nejati","family":"Jahromi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","unstructured":"Zeng, W.: Digital Watermarking and Data Hiding: Technologies and Applications. In: Proc. Int. Conf. Inf. Syst, Anal. Synth., vol.\u00a03, pp. 223\u2013229 (1998)"},{"issue":"13","key":"65_CR2","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1016\/S0031-3203(03)00221-8","volume":"36","author":"C.C. Thien","year":"2003","unstructured":"Thien, C.C., Lin, J.C.: A Simple and High-Hiding Capacity Method For Hiding Digit by Digit Data in Images Based On Modulus Function. Pattern Recognition\u00a036(13), 2875\u20132881 (2003)","journal-title":"Pattern Recognition"},{"issue":"3","key":"65_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding Data in Images by Simple LSB Substitution. Pattern Recognition\u00a037(3), 469\u2013474 (2004)","journal-title":"Pattern Recognition"},{"issue":"2","key":"65_CR4","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/30.964107","volume":"47","author":"J. Wang","year":"2001","unstructured":"Wang, J., Ji, L.: A Region and Data Hiding Based Error Concealment Scheme for Images. IEEE Transformations on Consumer Electronics\u00a047(2), 257\u2013262 (2001)","journal-title":"IEEE Transformations on Consumer Electronics"},{"issue":"3","key":"65_CR5","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R.Z. Wang","year":"2001","unstructured":"Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition\u00a034(3), 671\u2013683 (2001)","journal-title":"Pattern Recognition"},{"issue":"4","key":"65_CR6","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"15","author":"M.U. Celik","year":"2006","unstructured":"Celik, M.U., Sharma, G., Tekal, A.M.: Lossless Watermarking for Image Authentication: A new Framework and An Implementation. IEEE Trans. Image Process.\u00a015(4), 1042\u20131049 (2006)","journal-title":"IEEE Trans. Image Process."},{"key":"65_CR7","first-page":"218","volume-title":"Two-Dimensional Signal and Image Processing","author":"S. Lim","year":"1990","unstructured":"Lim, S.: Two-Dimensional Signal and Image Processing, pp. 218\u2013237. Prentice Hall, Englewood Cliffs (1990)"},{"key":"65_CR8","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lu, T.C.: Lossless Information Hiding Scheme Based on Neighboring Correlation. In: Second International Conference on Future Generation Communication and Networking Symposia (2008)","DOI":"10.1109\/FGCNS.2008.14"},{"key":"65_CR9","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless image data hiding. In: Proc. IEEE Int. Conf. Multimedia Expo., Taipei, Taiwan, R.O.C, pp. 2199\u20132202 (June 2004)"},{"key":"65_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/978-3-540-74260-9_64","volume-title":"Image Analysis and Recognition","author":"G. Xuan","year":"2007","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible Data Hiding for JPEG Images Based on Histogram Pairs. In: Kamel, M.S., Campilho, A. (eds.) ICIAR 2007. LNCS, vol.\u00a04633, pp. 715\u2013727. Springer, Heidelberg (2007)"},{"key":"65_CR11","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Ni, Z., Zou, D., Liang, C., Xuan, G.: Lossless data hiding: Fundamentals, algorithms and applications. In: Proc. IEEE Int. Symp. Circuits Syst., Vancouver, BC, Canada, vol.\u00a0II, pp. 33\u201336 (May 2004)","DOI":"10.1109\/ISCAS.2004.1329201"},{"key":"65_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/11922841_26","volume-title":"Digital Watermarking","author":"G. Xuan","year":"2006","unstructured":"Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 323\u2013332. Springer, Heidelberg (2006)"},{"key":"65_CR13","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1016\/j.jss.2009.05.051","volume":"82","author":"W. Hong","year":"2009","unstructured":"Hong, W., Chen, T.S., Shiu, C.W.: Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors. The Journal of Systems and Software\u00a082, 1833\u20131842 (2009)","journal-title":"The Journal of Systems and Software"}],"container-title":["Communications in Computer and Information Science","Digital Information and Communication Technology and Its Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21984-9_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T07:33:32Z","timestamp":1741246412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21984-9_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219832","9783642219849"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21984-9_65","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}