{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:38:34Z","timestamp":1725727114060},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642388859"},{"type":"electronic","value":"9783642388866"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38886-6_65","type":"book-chapter","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T09:46:40Z","timestamp":1369648000000},"page":"697-706","source":"Crossref","is-referenced-by-count":3,"title":["High Capacity Reversible Watermarking for Images Based on Classified Neural Network"],"prefix":"10.1007","author":[{"given":"Rongrong","family":"Ni","sequence":"first","affiliation":[]},{"given":"H. D.","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Hou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","first-page":"354","volume":"3","author":"Z. Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Trans. on Circuits Syst. Video Technol.\u00a03, 354\u2013362 (2006)","journal-title":"IEEE Trans. on Circuits Syst. Video Technol."},{"key":"65_CR2","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"8","author":"J. Tian","year":"2003","unstructured":"Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Trans. on Circuits Syst. Video Technol.\u00a08, 890\u2013896 (2003)","journal-title":"IEEE Trans. on Circuits Syst. Video Technol."},{"key":"65_CR3","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"3","author":"D.M. Thodi","year":"2007","unstructured":"Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. on Image Process.\u00a03, 721\u2013730 (2007)","journal-title":"IEEE Trans. on Image Process."},{"key":"65_CR4","first-page":"906","volume":"6","author":"W.L. Tsai","year":"2009","unstructured":"Tsai, W.L., Yeh, C.M., Chang, C.C.: Reversible Data Hiding based on Histogram Modification of Pixel Differences. IEEE Trans. on Circuits Syst. Video Technol.\u00a06, 906\u2013910 (2009)","journal-title":"IEEE Trans. on Circuits Syst. Video Technol."},{"key":"65_CR5","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"6","author":"P.Y. Tsai","year":"2009","unstructured":"Tsai, P.Y., Hu, C., Yeh, H.L.: Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting. IEEE Signal Process. Mag.\u00a06, 1129\u20131143 (2009)","journal-title":"IEEE Signal Process. Mag."},{"key":"65_CR6","first-page":"187","volume":"1","author":"L.Z. Luo","year":"2010","unstructured":"Luo, L.Z., Chen, N., Zeng, X., Xiong, Z.: Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. on Inf. Forensics and Security\u00a01, 187\u2013193 (2010)","journal-title":"IEEE Trans. on Inf. Forensics and Security"},{"key":"65_CR7","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"7","author":"V. Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., Shi, Y.Q., Suresh, S.: Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. on Circuits Syst. Video Technol.\u00a07, 989\u2013999 (2009)","journal-title":"IEEE Trans. on Circuits Syst. Video Technol."},{"key":"65_CR8","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"3","author":"D. Coltuc","year":"2011","unstructured":"Coltuc, D.: Improved Embedding for Prediction-Based Reversible Watermarking. IEEE Trans. on Inf. Forensics and Security\u00a03, 873\u2013882 (2011)","journal-title":"IEEE Trans. on Inf. Forensics and Security"}],"container-title":["Lecture Notes in Computer Science","Image Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38886-6_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T08:04:26Z","timestamp":1557734666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38886-6_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388859","9783642388866"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38886-6_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}