{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T00:02:43Z","timestamp":1766275363088},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T00:00:00Z","timestamp":1566604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T00:00:00Z","timestamp":1566604800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00905-7","type":"journal-article","created":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T05:05:13Z","timestamp":1566623113000},"page":"115-123","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes"],"prefix":"10.1007","volume":"17","author":[{"given":"Yi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Adrian G.","family":"Bors","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,24]]},"reference":[{"issue":"2017","key":"905_CR1","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.sigpro.2017.01.019","volume":"137","author":"M Amini","year":"2017","unstructured":"Amini, M., Ahmad, M.O., Swamy, M.N.S.: A new locally optimum watermark detection using vector-based hidden markov model in wavelet domain. Signal Process. 137(2017), 213\u2013222 (2017)","journal-title":"Signal Process."},{"key":"905_CR2","unstructured":"Bors, A.G., Pitas, I.: Image watermarking using DCT domain constraints. In: IEEE International Conference on Image Processing. IEEE, pp. 231\u2013234 (1996)"},{"key":"905_CR3","doi-asserted-by":"crossref","unstructured":"Denemark, T., Fridrich, J.: Steganography with two JPEGs of the same scene. In: ieee international conference on acoustics, speech and signal processing. IEEE, pp. 2117\u20132121 (2017)","DOI":"10.1109\/ICASSP.2017.7952530"},{"issue":"3","key":"905_CR4","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"905_CR5","doi-asserted-by":"crossref","unstructured":"Guo, L., Ni, J., Shi, Y.Q.: An efficient JPEG steganographic scheme using uniform embedding. In: IEEE international workshop on information forensics and security. IEEE, pp. 169\u2013174 (2012)","DOI":"10.1109\/WIFS.2012.6412644"},{"key":"905_CR6","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE workshop on information forensic and security. IEEE, pp. 234\u2013239 (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"905_CR7","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Digital steganography using universal distortion function. In: ACM workshop on information hiding and multimedia security. ACM, pp. 59\u201368 (2013)","DOI":"10.1145\/2482513.2482514"},{"issue":"1","key":"905_CR8","doi-asserted-by":"publisher","first-page":"315","DOI":"10.32604\/cmc.2019.05242","volume":"59","author":"YH Kang","year":"2019","unstructured":"Kang, Y.H., Liu, F.L., Yang, C.F., et al.: Color image steganalysis based on residuals of channel differences. Comput. Mater. Continua 59(1), 315\u2013329 (2019)","journal-title":"Comput. Mater. Continua"},{"key":"905_CR9","doi-asserted-by":"crossref","unstructured":"Koopman, P., Chakravarty, T.: Cyclic redundancy code (CRC) polynomial selection for embedded networks. In: International conference on dependable systems and networks. IEEE, pp. 145\u2013154 (2004)","DOI":"10.1109\/DSN.2004.1311885"},{"key":"905_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","volume":"53","author":"S Parah","year":"2016","unstructured":"Parah, S., Sheikh, J., Loan, N., et al.: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Dig. Signal Process. 53, 11\u201324 (2016)","journal-title":"Dig. Signal Process."},{"key":"905_CR11","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: ACM international workshop on information hiding. ACM, pp. 161\u2013177 (2010)","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"905_CR12","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ins.2018.07.021","volume":"465","author":"C Qin","year":"2018","unstructured":"Qin, C., He, Z.H., Luo, X.Y., et al.: Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf. Sci. 465, 285\u2013304 (2018)","journal-title":"Inf. Sci."},{"issue":"1","key":"905_CR13","first-page":"47","volume":"56","author":"ZG Qu","year":"2018","unstructured":"Qu, Z.G., Zhu, T.C., Wang, J.W., et al.: A novel quantum stegonagraphy based on brown states. Comput. Mater. Continua 56(1), 47\u201359 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"905_CR14","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forens. Secur. 11(2), 221\u2013234 (2016)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"3","key":"905_CR15","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TIP.2010.2073475","volume":"20","author":"J Tsai","year":"2011","unstructured":"Tsai, J., Huang, W., Kuo, Y.: On the selection of optimal feature region set for robust digital image watermarking. IEEE Trans. Image Process. 20(3), 735\u2013743 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"905_CR16","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1016\/j.sigpro.2011.11.033","volume":"92","author":"J Tsai","year":"2012","unstructured":"Tsai, J., Huang, W., Kuo, Y., et al.: Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions. Signal Process. 92(6), 1431\u20131445 (2012)","journal-title":"Signal Process."},{"key":"905_CR17","unstructured":"Wang, J.W., Ting, L., Luo, X.Y., et al.: Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain. IEEE transactions on circuits and systems for video technology, pp. 1\u201312 (2018)"},{"key":"905_CR18","doi-asserted-by":"crossref","unstructured":"Xu, G.S.: Deep convolutional neural network to detect J-UNIWARD. In: ACM workshop on information hiding and multimedia security. ACM, pp. 67\u201373 (2017)","DOI":"10.1145\/3082031.3083236"},{"issue":"11","key":"905_CR19","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J.Q., Yang, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forens. Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"905_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Luo, X.Y., Yang, C.F., et. al.: A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: IEEE international conference on availability, reliability and security. IEEE, pp 461\u2013466 (2015)","DOI":"10.1109\/ARES.2015.53"},{"issue":"15","key":"905_CR21","doi-asserted-by":"publisher","first-page":"2957","DOI":"10.1002\/sec.1502","volume":"9","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Luo, X.Y., Yang, C.F., et al.: A framework of adaptive steganography resisting JPEG compression and detection. Secur. Commun. Netw. 9(15), 2957\u20132971 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"905_CR22","doi-asserted-by":"publisher","first-page":"3649","DOI":"10.1007\/s11042-016-3914-0","volume":"76","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Luo, X.Y., Yang, C.F., et al.: Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multimedia Tools Appl. 76(3), 3649\u20133668 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"905_CR23","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Qin, C., Zhang, W.M., et al.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99\u2013111 (2018)","journal-title":"Signal Process."},{"issue":"1","key":"905_CR24","first-page":"59","volume":"55","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Ye, D.P., Gan, J.J., et al.: An image steganography algorithm based on quantization index modulation resisting scaling attacksand statistical detection. Comput. Mater. Continua 55(1), 59\u201370 (2018)","journal-title":"Comput. Mater. Continua"},{"key":"905_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, Y.W., Zhang, W.M., Chen, K.J., et. al.: Adversarial examples against deep neural network based steganalysis. In: ACM workshop on information hiding and multimedia security. ACM, pp. 67\u201372 (2018)","DOI":"10.1145\/3206004.3206012"},{"issue":"14","key":"905_CR26","doi-asserted-by":"publisher","first-page":"17913","DOI":"10.1007\/s11042-017-4506-3","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Zhu, X.D., Qin, C., et al.: Dither modulation based adaptive steganography resisting JPEG compression and statistic detection. Multimedia Tools Appl. 77(14), 17913\u201317935 (2018)","journal-title":"Multimedia Tools Appl."},{"key":"905_CR27","first-page":"1","volume":"2","author":"ZL Zhou","year":"2018","unstructured":"Zhou, Z.L., Yan, M., Wu, Q.M.J.: Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 2, 1\u201312 (2018)","journal-title":"Soft Comput."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00905-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00905-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00905-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T23:09:29Z","timestamp":1598137769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00905-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,24]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["905"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00905-7","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,24]]},"assertion":[{"value":"24 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}