{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:48:59Z","timestamp":1725691739178},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322044"},{"type":"electronic","value":"9783642322051"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32205-1_6","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T10:09:01Z","timestamp":1342260541000},"page":"42-56","source":"Crossref","is-referenced-by-count":1,"title":["A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding"],"prefix":"10.1007","author":[{"given":"Junxiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Jinwei","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Barton, J.M.: Method and Apparatus for Embedding Authentication Information within Digital Data. U.S. Patent 5646997 (1997)","key":"6_CR1"},{"unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. In: Proc. SPIE Security and Watermarking of Multimedia Contents III, San Jose, CA, pp. 197\u2013208 (2001)","key":"6_CR2"},{"doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless Data Embedding for All Image Formats. In: Proc:SPIE Security Watermarking Multimedia Contents IV, San Jose, CA, pp. 185\u2013196 (2002)","key":"6_CR3","DOI":"10.1117\/12.465317"},{"issue":"2","key":"6_CR4","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"M.U. Celik","year":"2005","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. IEEE Trans. Image Process\u00a014(2), 253\u2013266 (2005)","journal-title":"IEEE Trans. Image Process"},{"issue":"8","key":"6_CR5","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J. Tian","year":"2003","unstructured":"Tian, J.: Reversible Watermarking Using A Difference Expansion. IEEE Trans. Circuits Syst. Video Technol.\u00a013(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"6_CR6","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L. Kamstra","year":"2005","unstructured":"Kamstra, L., Heijmans, A.M.: Reversible Data Embedding into Images Using Wavelet Techniques and Sorting. IEEE Trans. Image Process\u00a014(12), 2082\u20132090 (2005)","journal-title":"IEEE Trans. Image Process"},{"issue":"3","key":"6_CR7","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"H.J. Kim","year":"2008","unstructured":"Kim, H.J., Sachnev, V., Shi, Y.Q., Nam, J., Choo, H.G.: A Novel Difference Expansion Transform for Reversible Data Embedding. IEEE Trans. Inf. Forensic Security\u00a03(3), 456\u2013465 (2008)","journal-title":"IEEE Trans. Inf. Forensic Security"},{"issue":"2","key":"6_CR8","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y. Hu","year":"2009","unstructured":"Hu, Y., Lee, H.K., Li, J.: DE-based Reversible Data Hiding with Improved Overflow Location Map. IEEE Trans. Circuits Syst. Video Technol.\u00a019(2), 250\u2013260 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"6_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S. Lee","year":"2007","unstructured":"Lee, S., Yoo, C.D., Kalker, T.: Reversible Image Watermarking Based on Integer-To-Integer Wavelet Transform. IEEE Trans. Inf. Forensics Security\u00a02(3), 321\u2013330 (2007)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"D.M. Thodi","year":"2007","unstructured":"Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Process\u00a016(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process"},{"issue":"7","key":"6_CR11","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V. Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol.\u00a019(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"6_CR12","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z. Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol.\u00a016(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/11922841_28","volume-title":"Digital Watermarking","author":"J. Hwang","year":"2006","unstructured":"Hwang, J., Kim, J., Choi, J.: A Reversible Watermarking Based on Histogram Shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 348\u2013361. Springer, Heidelberg (2006)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/11922841_26","volume-title":"Digital Watermarking","author":"G. Xuan","year":"2006","unstructured":"Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 323\u2013332. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Wu, X.: Reversible Semi-fragile Watermarking Based on Histogram Shifting of Integer Wavelet Coefficients. In: Proc. Digital Ecosystems and Technologies, Cairns, Australia, pp. 501\u2013505 (2007)","key":"6_CR15","DOI":"10.1109\/DEST.2007.372028"},{"issue":"12","key":"6_CR16","doi-asserted-by":"publisher","first-page":"2582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"C.C. Lin","year":"2008","unstructured":"Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images. Pattern Recognition\u00a041(12), 2582\u20133591 (2008)","journal-title":"Pattern Recognition"},{"issue":"6","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P. Tsai","year":"2009","unstructured":"Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting. Signal Processing\u00a089(6), 1129\u20131143 (2009)","journal-title":"Signal Processing"},{"issue":"6","key":"6_CR18","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"W.L. Tai","year":"2009","unstructured":"Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol.\u00a019(6), 906\u2013910 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"6_CR19","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L. Luo","year":"2010","unstructured":"Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. Inf. Forensics Security\u00a05(1), 187\u2013193 (2010)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"doi-asserted-by":"crossref","unstructured":"Yang, B., Schmucker, M., Niu, X., Busch, C., Sun, S.: Approaching Optimal Value Expansion for Reversible Watermarking. In: Proceedings of ACM Multimedia and Security Workshop, New York, USA, pp. 95\u2013101 (2005)","key":"6_CR20","DOI":"10.1145\/1073170.1073188"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32205-1_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:57:19Z","timestamp":1620129439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32205-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322044","9783642322051"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32205-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}