{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:40:02Z","timestamp":1751431202646,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811085291"},{"type":"electronic","value":"9789811085307"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-8530-7_42","type":"book-chapter","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T15:04:19Z","timestamp":1519830259000},"page":"429-439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Robust Steganography via Patch-Based Texture Synthesis"],"prefix":"10.1007","author":[{"given":"Zhengcai","family":"Qin","sequence":"first","affiliation":[]},{"given":"Meng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,1]]},"reference":[{"issue":"2","key":"42_CR1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31(2), 26\u201334 (1998)","journal-title":"Computer"},{"issue":"9","key":"42_CR2","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1007\/s00371-006-0069-4","volume":"22","author":"YM Cheng","year":"2006","unstructured":"Cheng, Y.M., Wang, C.M.: A high-capacity steganographic approach for 3D polygonal meshes. Vis. Comput. 22(9), 845\u2013855 (2006)","journal-title":"Vis. Comput."},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Petrowski, K., Kharrazi, M., Sencar, H.T., Memon, N.: PSTEG: steganographic embedding through patching [image steganography]. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, Proceedings, vol. 2, pp. 537\u2013540. IEEE Xplore (2005)","DOI":"10.1109\/ICASSP.2005.1415460"},{"issue":"1","key":"42_CR4","first-page":"130","volume":"24","author":"KC Wu","year":"2014","unstructured":"Wu, K.C., Wang, C.M.: Steganography using reversible texture synthesis. IEEE Trans. Image Process. 24(1), 130\u2013139 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"42_CR5","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-50209-0_4","volume-title":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","author":"Z Qian","year":"2017","unstructured":"Qian, Z., Zhou, H., Zhang, W., Zhang, X.: Robust steganography using texture synthesis. Advances in Intelligent Information Hiding and Multimedia Signal Processing. SIST, vol. 63, pp. 25\u201333. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-50209-0_4"},{"issue":"12","key":"42_CR6","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1007\/s00371-014-1045-z","volume":"31","author":"J Xu","year":"2015","unstructured":"Xu, J., Mao, X., Jin, X., Jaffer, A., Lu, S., Li, L., et al.: Hidden message in a deformation-based texture. Vis. Comput. 31(12), 1653\u20131669 (2015)","journal-title":"Vis. Comput."},{"key":"42_CR7","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Efros, A.A., Leung, T.K.: Texture syntesis by non-parametric sampling. In: The Proceedings of the Seventh IEEE International Conference on Computer Vision. IEEE, vol. 2, p. 1033 (1999)","DOI":"10.1109\/ICCV.1999.790383"},{"issue":"3","key":"42_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1360612.1360650","volume":"27","author":"C Han","year":"2008","unstructured":"Han, C., Risser, E., Ramamoorthi, R., Grinspun, E.: Multiscale texture synthesis. ACM Trans. Graph. 27(3), 1\u20138 (2008)","journal-title":"ACM Trans. Graph."},{"key":"42_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-73214-3_13","volume-title":"Smart Graphics","author":"H Otori","year":"2007","unstructured":"Otori, H., Kuriyama, S.: Data-embeddable texture synthesis. In: Butz, A., Fisher, B., Kr\u00fcger, A., Olivier, P., Owada, S. (eds.) SG 2007. LNCS, vol. 4569, pp. 146\u2013157. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73214-3_13"},{"issue":"6","key":"42_CR11","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCG.2009.127","volume":"29","author":"H Otori","year":"2009","unstructured":"Otori, H., Kuriyama, S.: Texture synthesis for mobile data communications. Comput. Graph. Appl. IEEE 29(6), 74\u201381 (2009)","journal-title":"Comput. Graph. Appl. IEEE"},{"issue":"3","key":"42_CR12","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1145\/501786.501787","volume":"20","author":"L Liang","year":"2001","unstructured":"Liang, L.: Real-time texture synthesis by patch-based sampling. ACM Trans. Graph. 20(3), 127\u2013150 (2001)","journal-title":"ACM Trans. Graph."},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Efros, A.A., Freeman, W.T.: Image quilting for texture synthesis and transfer. In: Conference on Computer Graphics and Interactive Techniques, pp. 341\u2013346. ACM (2001)","DOI":"10.1145\/383259.383296"},{"key":"42_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","volume-title":"Cloud Computing and Security","author":"Z Zhou","year":"2015","unstructured":"Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123\u2013132. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27051-7_11"},{"issue":"1","key":"42_CR15","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/2685263","volume":"42","author":"JL Rodgers","year":"1988","unstructured":"Rodgers, J.L., Nicewander, W.A.: Thirteen ways to look at the correlation coefficient. Am. Stat. 42(1), 59\u201366 (1988)","journal-title":"Am. Stat."},{"key":"42_CR16","unstructured":"Brodatz Texture, Texture Image Database. http:\/\/multibandtexture.recherche.usherbrooke.ca\/original_brodatz.html"}],"container-title":["Communications in Computer and Information Science","Internet Multimedia Computing and Service"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-8530-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:02:12Z","timestamp":1751428932000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-8530-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811085291","9789811085307"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-8530-7_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}