{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:08Z","timestamp":1725790988202},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_65","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"633-642","source":"Crossref","is-referenced-by-count":0,"title":["Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy"],"prefix":"10.1007","author":[{"given":"Ya-Ting","family":"Chang","sequence":"first","affiliation":[]},{"given":"Min-Hao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shiuh-Jeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"65_CR1","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-30567-2_20","volume":"294","author":"E.S.M. El-Alfy","year":"2012","unstructured":"El-Alfy, E.S.M., Al-Sadi, A.A.: High-capacity image steganography based on overlapped pixel differences and modulus function. Networked Digital Technologies\u00a0294(1), 243\u2013252 (2012)","journal-title":"Networked Digital Technologies"},{"issue":"9","key":"65_CR2","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1016\/j.sigpro.2013.03.029","volume":"93","author":"X. Li","year":"2013","unstructured":"Li, X., Li, B., Luo, X., Yang, B., Zhu, R.: Steganalysis of a PVD-based content adaptive image steganography. Signal Processing\u00a093(9), 2529\u20132538 (2013)","journal-title":"Signal Processing"},{"issue":"1","key":"65_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y. Linde","year":"1980","unstructured":"Linde, Y., Bruzo, A., Gray, R.M.: An algorithm for vector quantizer design. IEEE Transactions on Communications\u00a028(1), 84\u201395 (1980)","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"65_CR4","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.ins.2011.06.003","volume":"188","author":"D.C. Lou","year":"2012","unstructured":"Lou, D.C., Hu, C.H.: LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Information Sciences\u00a0188(1), 346\u2013358 (2012)","journal-title":"Information Sciences"},{"issue":"10-11","key":"65_CR5","doi-asserted-by":"publisher","first-page":"2510","DOI":"10.1016\/j.optcom.2012.01.021","volume":"285","author":"D.C. Lou","year":"2012","unstructured":"Lou, D.C., Chou, C.L., Tso, H.K., Chiu, C.C.: Active steganalysis for histogram-shifting based reversible data hiding. Optics Communications\u00a0285(10-11), 2510\u20132518 (2012)","journal-title":"Optics Communications"},{"issue":"14","key":"65_CR6","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1049\/el:20000876","volume":"36","author":"Z.M. Lu","year":"2000","unstructured":"Lu, Z.M., Pan, J.S., Sun, S.H.: VQ-based digital image watermarking method. Electronics Letters\u00a036(14), 1201\u20131202 (2000)","journal-title":"Electronics Letters"},{"issue":"9","key":"65_CR7","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1016\/j.sigpro.2008.03.016","volume":"88","author":"X.Y. Luo","year":"2008","unstructured":"Luo, X.Y., Wang, D.S., Wang, P., Liu, F.L.: A review on blind detection for image steganography. Signal Processing\u00a088(9), 2138\u20132157 (2008)","journal-title":"Signal Processing"},{"issue":"3","key":"65_CR8","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z. Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology\u00a016(3), 354\u2013362 (2006)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"5","key":"65_CR9","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.patrec.2005.09.008","volume":"27","author":"H. Noda","year":"2006","unstructured":"Noda, H., Niimi, M., Kawaguchi, E.: High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters\u00a027(5), 455\u2013461 (2006)","journal-title":"Pattern Recognition Letters"},{"issue":"9","key":"65_CR10","doi-asserted-by":"publisher","first-page":"2687","DOI":"10.1016\/j.sigpro.2013.03.036","volume":"93","author":"C. Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Chen, Y.C.: Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Processing\u00a093(9), 2687\u20132695 (2013)","journal-title":"Signal Processing"},{"issue":"1","key":"65_CR11","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/978-3-642-18405-5_17","volume":"6526","author":"V. Sachnev","year":"2011","unstructured":"Sachnev, V., Kim, H.J.: Ternary data hiding technique for JPEG steganography. Digital Watermarking\u00a06526(1), 202\u2013210 (2011)","journal-title":"Digital Watermarking"},{"issue":"1","key":"65_CR12","first-page":"121","volume":"2","author":"S.R. Tsui","year":"2013","unstructured":"Tsui, S.R., Huang, C.T., Wang, W.J.: Image steganography using gradient adjacent prediction in side-match vector quantization. Advances in Intelligent Systems and Applications\u00a02(1), 121\u2013129 (2013)","journal-title":"Advances in Intelligent Systems and Applications"},{"key":"65_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"issue":"6","key":"65_CR14","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.cose.2005.05.001","volume":"24","author":"H.C. Wu","year":"2005","unstructured":"Wu, H.C., Chang, C.C.: A novel digital image watermarking scheme based on the vector quantization technique. Computers & Security\u00a024(6), 460\u2013471 (2005)","journal-title":"Computers & Security"},{"issue":"1","key":"65_CR15","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jvcir.2009.10.003","volume":"21","author":"C.H. Yang","year":"2010","unstructured":"Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Grouping strategies for promoting image quality of watermarking on the basis of vector quantization. Journal of Visual Communication and Image Representation\u00a021(1), 49\u201355 (2010)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"65_CR16","unstructured":"S-Tools, a steganography software that allows audio and image files to be hidden within other audio and image files, \n                      \n                        http:\/\/www.cs.vu.nl\/~ast\/books\/mos2\/zebras.html"},{"key":"65_CR17","unstructured":"Uncompressed Colour Image Database (UCID), provides a benchmark dataset for image retrieval, \n                      \n                        http:\/\/homepages.lboro.ac.uk\/~cogs\/datasets\/ucid\/ucid.html"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T12:55:57Z","timestamp":1558875357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}