{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:05:48Z","timestamp":1725613548521},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642238864"},{"type":"electronic","value":"9783642238871"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23887-1_56","type":"book-chapter","created":{"date-parts":[[2011,9,24]],"date-time":"2011-09-24T01:10:54Z","timestamp":1316826654000},"page":"439-443","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Image Data Hiding Method Using Two-Layer Embedment Strategy"],"prefix":"10.1007","author":[{"given":"Wien","family":"Hong","sequence":"first","affiliation":[]},{"given":"Yeon-Kang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kai-Yung","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Mei-Chen","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"3","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy\u00a03, 32\u201344 (2003)","journal-title":"IEEE Security and Privacy"},{"issue":"7","key":"56_CR2","first-page":"1062","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding\u2014A Survey. Proceedings of the IEEE, special issue on protection of multimedia content\u00a087(7), 1062\u20131078 (1999)","journal-title":"Proceedings of the IEEE, special issue on protection of multimedia content"},{"issue":"10","key":"56_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"H. Wang","year":"2004","unstructured":"Wang, H., Wang, S.: Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM\u00a047(10), 76\u201382 (2004)","journal-title":"Steganalysis. Communications of the ACM"},{"issue":"8","key":"56_CR4","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J. Tian","year":"2003","unstructured":"Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(8), 890\u2013896 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"56_CR5","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z. Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology\u00a016(3), 354\u2013362 (2006)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"56_CR6","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"D.M. Thodi","year":"2007","unstructured":"Thodi, D.M., Rodr\u00edguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Transactions on Image Processing\u00a016(3), 721\u2013730 (2007)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"6","key":"56_CR7","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P.Y. Tsai","year":"2009","unstructured":"Tsai, P.Y., Hu, Y.C., Yeh, H.L.: Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting. Signal Processing\u00a089(6), 1129\u20131143 (2009)","journal-title":"Signal Processing"},{"issue":"12","key":"56_CR8","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1016\/j.jss.2010.08.047","volume":"83","author":"W. Hong","year":"2010","unstructured":"Hong, W., Chen, T.S.: A Local Variance-Controlled Reversible Data Hiding Method Using Prediction and Histogram-Shifting. The Journal of Systems and Software\u00a083(12), 2653\u20132663 (2010)","journal-title":"The Journal of Systems and Software"},{"issue":"2","key":"56_CR9","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.jvcir.2010.11.004","volume":"22","author":"W. Hong","year":"2011","unstructured":"Hong, W., Chen, T.S.: Reversible Data Embedding for High Quality Images Using Interpolation and Reference Pixel Distribution Mechanism. Journal of Visual Communication and Image Representation\u00a022(2), 131\u2013140 (2011)","journal-title":"Journal of Visual Communication and Image Representation"},{"unstructured":"USC-SIPI image database, \n                    \n                      http:\/\/sipi.usc.edu\/database","key":"56_CR10"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23887-1_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,7]],"date-time":"2019-04-07T15:33:44Z","timestamp":1554651224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23887-1_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642238864","9783642238871"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23887-1_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}