{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T16:53:28Z","timestamp":1691600008904},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,6,18]],"date-time":"2010-06-18T00:00:00Z","timestamp":1276819200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s11235-010-9364-5","type":"journal-article","created":{"date-parts":[[2010,6,17]],"date-time":"2010-06-17T21:32:46Z","timestamp":1276810366000},"page":"179-185","source":"Crossref","is-referenced-by-count":6,"title":["Efficient data hiding with histogram-preserving property"],"prefix":"10.1007","volume":"49","author":[{"given":"Xinpeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shuozhong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,6,18]]},"reference":[{"issue":"10","key":"9364_CR1","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"H. Wang","year":"2004","unstructured":"Wang, H., & Wang, S. (2004). Cyber warfare: steganography vs. steganalysis. Communication of the ACM, 47(10), 76\u201382.","journal-title":"Communication of the ACM"},{"issue":"3","key":"9364_CR2","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/LSP.2005.862602","volume":"13","author":"X. Zhang","year":"2006","unstructured":"Zhang, X., & Wang, S. (2006). Dynamical running coding in digital steganography. IEEE Signal Processing Letters, 13(3), 165\u2013168.","journal-title":"IEEE Signal Processing Letters"},{"issue":"1","key":"9364_CR3","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"3","author":"J. Fridrich","year":"2006","unstructured":"Fridrich, J., & Soukal, D. (2006). Matrix embedding for large payloads. IEEE Transformations on Information Forensics and Security, 3(1), 390\u2013394.","journal-title":"IEEE Transformations on Information Forensics and Security"},{"key":"9364_CR4","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/978-3-540-78849-2","volume-title":"Proceedings of the 10th information hiding workshop","author":"W. Zhang","year":"2008","unstructured":"Zhang, W., Zhang, X., & Wang, S. (2008). Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes. In Lecture notes in computer science : Vol. 5284. Proceedings of the 10th information hiding workshop (pp. 60\u201371). Berlin: Springer."},{"key":"9364_CR5","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Proceedings of the 6th information hiding workshop","author":"P. Sallee","year":"2004","unstructured":"Sallee, P. (2004). Model-based steganography. In Lecture notes in computer science : Vol. 2939. Proceedings of the 6th information hiding workshop (pp. 154\u2013167). Berlin: Springer."},{"key":"9364_CR6","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/978-3-540-45215-7_34","volume-title":"Computer network security","author":"X. Zhang","year":"2003","unstructured":"Zhang, X., Wang, S., & Zhang, K. (2003). Steganography with least histogram abnormality. In Lecture notes in computer science : Vol. 2776. Computer network security (pp. 395\u2013406). Berlin: Springer."},{"key":"9364_CR7","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/978-3-540-88961-8_17","volume-title":"Proceedings of the 10th information hiding workshop","author":"H. Wu","year":"2008","unstructured":"Wu, H., Dugelay, J., & Cheung, Y. (2008). A data mapping method for steganography and its application to images. In Lecture notes in computer science : Vol. 5284. Proceedings of the 10th information hiding workshop (pp. 236\u2013250). Berlin: Springer."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-010-9364-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-010-9364-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-010-9364-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:50:09Z","timestamp":1559386209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-010-9364-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,18]]},"references-count":7,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["9364"],"URL":"https:\/\/doi.org\/10.1007\/s11235-010-9364-5","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,6,18]]}}}