{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:55:18Z","timestamp":1743141318896,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":6,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400767379"},{"type":"electronic","value":"9789400767386"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-6738-6_36","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T15:22:19Z","timestamp":1367508139000},"page":"285-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reversible Image Watermarking Based on Neural Network and Parity Property"],"prefix":"10.1007","author":[{"given":"Rongrong","family":"Ni","sequence":"first","affiliation":[]},{"given":"H. D.","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zhitong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,3]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"8","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 8:890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"3","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 3:721\u2013730","journal-title":"IEEE Trans Image Process"},{"key":"36_CR3","first-page":"906","volume":"6","author":"WL Tsai","year":"2009","unstructured":"Tsai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 6:906\u2013910","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"6","author":"PY Tsai","year":"2009","unstructured":"Tsai PY, Hu C, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. IEEE Signal Process Mag 6:1129\u20131143","journal-title":"IEEE Signal Process Mag"},{"key":"36_CR5","first-page":"187","volume":"1","author":"LZ Luo","year":"2010","unstructured":"Luo LZ, Chen N, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 1:187\u2013193","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"36_CR6","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"7","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim HJ, Nam J, Shi YQ, Suresh S (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 7:989\u2013999","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["Lecture Notes in Electrical Engineering","Multimedia and Ubiquitous Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-6738-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T11:31:27Z","timestamp":1676806287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-6738-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9789400767379","9789400767386"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-6738-6_36","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"3 May 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}