{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:33:14Z","timestamp":1764603194303,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":11,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400769953"},{"type":"electronic","value":"9789400769960"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-6996-0_63","type":"book-chapter","created":{"date-parts":[[2013,7,13]],"date-time":"2013-07-13T14:05:32Z","timestamp":1373724332000},"page":"597-605","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Application of QR-Code Steganography Using Data Embedding Technique"],"prefix":"10.1007","author":[{"given":"Wen-Chuan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zi-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wei-Teng","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"63_CR1","first-page":"80","volume":"2","author":"O Deshmukh","year":"2013","unstructured":"Deshmukh O, Sonavane S (2013) Multi-share crypt-stego authentication system. Int J Comput Sci Mobile Comput 2(2):80\u201390","journal-title":"Int J Comput Sci Mobile Comput"},{"key":"63_CR2","first-page":"1","volume":"58","author":"HC Huang","year":"2009","unstructured":"Huang HC, Chang FC, Fang WC (2009) Applications of reversible data hiding techniques with the quick response codes. Commun Comput Inf Sci 58:1\u20138","journal-title":"Commun Comput Inf Sci"},{"key":"63_CR3","doi-asserted-by":"crossref","unstructured":"Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: 4th international workshop on trustworthy ubiquitous computing, Paris, France, pp 1\u20136","DOI":"10.1145\/1971519.1971593"},{"key":"63_CR4","unstructured":"Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for QR code based on watermark by compare DCT with DFT domain. In: 3rd international conference on computer and communication technologies, India, pp 144\u2013148"},{"key":"63_CR5","doi-asserted-by":"crossref","unstructured":"Wu WC, Wu YC (2012) Improved reversible data hiding based on residue histogram shifting. In: 6th international conference on genetic and evolutionary computing, Kitakyushu, Japan, pp 23\u201326","DOI":"10.1109\/ICGEC.2012.104"},{"issue":"2","key":"63_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1984.1162229","volume":"1","author":"RM Gray","year":"1984","unstructured":"Gray RM (1984) Vector quantization. IEEE ASSP Mag 1(2):4\u201329","journal-title":"IEEE ASSP Mag"},{"key":"63_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y Linde","year":"1980","unstructured":"Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84\u201395","journal-title":"IEEE Trans Commun"},{"key":"63_CR8","doi-asserted-by":"publisher","first-page":"3543","DOI":"10.1016\/j.ins.2008.05.003","volume":"178","author":"CC Chang","year":"2008","unstructured":"Chang CC, Wu WC, Chen YH (2008) Joint coding and embedding techniques for multimedia images. Inf Sci 178:3543\u20133556","journal-title":"Inf Sci"},{"issue":"1","key":"63_CR9","first-page":"269","volume":"9","author":"GT Shrivakshan","year":"2012","unstructured":"Shrivakshan GT, Chandrasekar C (2012) A comparison of various edge detection techniques used in image processing. Int J Comput Sci Issues 9(1):269\u2013276","journal-title":"Int J Comput Sci Issues"},{"key":"63_CR10","doi-asserted-by":"crossref","unstructured":"Chang CC, Wu WC (2005) A steganographic method for hiding secret data using side match vector quantization. IEICE Trans Inf Syst E99-D(9):2159\u20132167","DOI":"10.1093\/ietisy\/e88-d.9.2159"},{"issue":"4","key":"63_CR11","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1016\/j.sigpro.2012.11.013","volume":"93","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images Based on VQ indexing and inpainting. Signal Process 93(4):933\u2013946","journal-title":"Signal Process"}],"container-title":["Lecture Notes in Electrical Engineering","Information Technology Convergence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-6996-0_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T07:09:14Z","timestamp":1715411354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-6996-0_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9789400769953","9789400769960"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-6996-0_63","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"14 July 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}