{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T12:00:26Z","timestamp":1774872026248,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2001,2,1]],"date-time":"2001-02-01T00:00:00Z","timestamp":980985600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2001,2,1]],"date-time":"2001-02-01T00:00:00Z","timestamp":980985600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["The Journal of VLSI Signal Processing-Systems for Signal, Image, and Video Technology"],"published-print":{"date-parts":[[2001,2]]},"DOI":"10.1023\/a:1008107127819","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T08:17:47Z","timestamp":1040545067000},"page":"7-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":115,"title":["Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia"],"prefix":"10.1007","volume":"27","author":[{"given":"Brian","family":"Chen","sequence":"first","affiliation":[]},{"given":"Gregory W.","family":"Wornell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,2,1]]},"reference":[{"key":"310967_CR1","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F. Hartung","year":"1999","unstructured":"F. Hartung and M. Kutter, \u201cMultimedia Watermarking Tech-niques, \u201d Proceedings of the IEEE, vol. 87, 1999, pp. 1079\u20131107.","journal-title":"Proceedings of the IEEE"},{"key":"310967_CR2","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/5.687830","volume":"86","author":"M.D. Swanson","year":"1998","unstructured":"M.D. Swanson, M. Kobayashi, and A.H. Tewfik, \u201cMultimedia Data-Embedding and Water-Marking Technologies, \u201d Proceed-ings of the IEEE, vol. 86, 1998, pp. 1064\u20131087.","journal-title":"Proceed-ings of the IEEE"},{"key":"310967_CR3","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"I.J. Cox","year":"1998","unstructured":"I.J. Cox and J.-P.M.G. Linnartz, \u201cSome General Methods for Tampering with Watermarks, \u201d IEEE Journal on Selected Areas in Communications, vol. 16, 1998, pp. 587\u2013593.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"310967_CR4","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1109\/ICASSP.1999.758339","volume":"4","author":"J.-P. Linnartz","year":"1999","unstructured":"J.-P. Linnartz, T. Kalker, and J. Haitsma, \u201cDetecting Electronic Watermarks in Digital Video, \u201d in Proc.of the 1999 IEEE Interna-tional Conference on Acoustics, Speech, and Signal Processing, Phoenix, AZ, March 1999, vol. 4, pp. 2071\u20132074.","journal-title":"Proc. of the 1999 IEEE Interna-tional Conference on Acoustics, Speech, and Signal Processing"},{"key":"310967_CR5","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kundur","year":"1999","unstructured":"D. Kundur and D. Hatzinakos, \u201cDigital Watermarking for Tell-tale Tamper Proofing and Authentication, \u201d Proceedings of the IEEE, vol. 87, 1999, pp. 1167\u20131180.","journal-title":"Proceedings of the IEEE"},{"key":"310967_CR6","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, \u201cInformation Hiding-A Survey, \u201d Proceedings of the IEEE, vol. 87, 1999, pp. 1062\u20131078.","journal-title":"Proceedings of the IEEE"},{"key":"310967_CR7","unstructured":"B. Chen, \u201cDesign and Analysis of Digital Watermarking, Infor-mation Embedding, and Data Hiding Systems, \u201d Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, June 2000."},{"key":"310967_CR8","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1109\/26.718565","volume":"46","author":"H.C. Papadopoulos","year":"1998","unstructured":"H.C. Papadopoulos and C.-E.W. Sundberg, \u201cSimultaneous Broadcasting of Analog FMand Digital Audio Signals by Means of Adaptive Precanceling Techniques, \u201d IEEE Transactions on Communications, vol. 46, 1998, pp. 1233\u20131242.","journal-title":"IEEE Transactions on Communications"},{"key":"310967_CR9","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/ICC.1999.765388","volume":"2","author":"B. Chen","year":"1999","unstructured":"B. Chen and C.-E.W. Sundberg, \u201cBroadcasting Data in the FM Band by Means of Adaptive Contiguous Band Insertion and Precancelling Techniques, \u201d in Proceedings of 1999 IEEE Inter-national Conference on Communications, Vancouver, Canada, June 1999, vol. 2, pp. 823\u2013827.","journal-title":"Proceedings of 1999 IEEE Inter-national Conference on Communications"},{"key":"310967_CR10","first-page":"676","volume":"2","author":"M.D. Swanson","year":"1997","unstructured":"M.D. Swanson, B. Zhu, and A.H. Tewfik, \u201cData Hiding for Video-in-Video, \u201d in Proceedings of the 1997 IEEE International Conference on Image Processing, Piscataway, NJ, 1997, vol. 2, pp. 676\u2013679.","journal-title":"Proceedings of the 1997 IEEE International Conference on Image Processing"},{"key":"310967_CR11","unstructured":"B. Chen and G.W. Wornell, \u201cQuantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding, \u201d To appear, IEEE Transactions on Information Theory, accepted for publication."},{"issue":"3\/4","key":"310967_CR12","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"W. Bender, D. Gruhl, N. Morimoto, and A. Lu, \u201cTechniques for Data Hiding, \u201d IBM Systems Journal, vol. 35, no. 3\/4, 1996, pp. 313\u2013336.","journal-title":"IBM Systems Journal"},{"key":"310967_CR13","doi-asserted-by":"crossref","unstructured":"I.J. Cox, J. Killian, T. Leighton, and T. Shamoon, \u201cA Secure, Robust Watermark for Multimedia, \u201d in Information Hiding.First International Workshop Proceedings, June 1996, pp. 185\u2013206.","DOI":"10.1007\/3-540-61996-8_41"},{"key":"310967_CR14","doi-asserted-by":"crossref","unstructured":"J.R. Smith and B.O Comiskey, \u201cModulation and Information Hiding in Images, \u201d in Information Hiding.First International Workshop Proceedings, June 1996, pp. 207\u2013226.","DOI":"10.1007\/3-540-61996-8_42"},{"key":"310967_CR15","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/49.668974","volume":"16","author":"J.R. Hernandez","year":"1998","unstructured":"J.R. Hernandez, F. Perez-Gonzalez, J.M. Rodriguez, and G. Nieto, \u201cPerformance Analysis of a 2-D-Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images, \u201d IEEE Journal on Selected Areas in Communications, vol. 16, 1998, pp. 510\u2013524.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"310967_CR16","unstructured":"A.Z. Tirkel, G.A. Rankin, R. van Schyndel, W.J. Ho, N.R.A. Mee, and C.F. Osborne, \u201cElectronic Water Mark, \u201d in Proceed-ings of Digital Image Computing, Technology and Applications, Sydney, Australia, Dec. 1993, pp. 666\u2013672."},{"key":"310967_CR17","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/ICIP.1994.413536","volume":"2","author":"R. van Schyndel","year":"1994","unstructured":"R. van Schyndel, A.Z. Tirkel, and C.F. Osborne, \u201cA Digital Wa-termark, \u201d in Proceedings of the First IEEE International Con-ference on Image Processing, Austin, TX, Nov. 1994, vol. 2, pp. 86\u201390.","journal-title":"Proceedings of the First IEEE International Con-ference on Image Processing"},{"key":"310967_CR18","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"I.J. Cox, J. Killian, F.T. Leighton, and T. Shamoon, \u201cSecure Spread Spectrum Watermarking for Multimedia, \u201d IEEE Trans-actions on Image Processing, vol. 6, pp. 1673\u20131687, 1997.","journal-title":"IEEE Trans-actions on Image Processing"},{"key":"310967_CR19","unstructured":"J.K. Su, \u201cPower-Spectrum Condition-Complaint Watermarking, \u201d DFG V 3 D 2 Watermarking Workshop, Oct. 1999. Abstract and transparencies from this talk were obtained from http:\/\/www.lnt.de\/~watermarking."},{"key":"310967_CR20","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"C.I. Podilchuk","year":"1998","unstructured":"C.I. Podilchuk and W. Zeng, \u201cImage-Adaptive Watermarking Using Visual Models, \u201d IEEE Journal on Selected Areas in Com-munications, vol. 16, 1998, pp. 525\u2013539.","journal-title":"IEEE Journal on Selected Areas in Com-munications"},{"key":"310967_CR21","doi-asserted-by":"crossref","unstructured":"M.D. Swanson, B. Zhu, and A.H. Tewfik, \u201cRobust Data Hiding for Images, \u201d in Proceedings of the 1996 IEEE Digital Signal Processing Workshop, Loen, Norway, Sept. 1996, pp. 37\u201340.","DOI":"10.1109\/DSPWS.1996.555454"},{"key":"310967_CR22","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1117\/12.344684","volume":"3657","author":"B. Chen","year":"1999","unstructured":"B. Chen and G.W. Wornell, \u201cDither Modulation: A New Ap-proach to Digital Watermarking and Information Embedding, \u201d in Proceedings of SPIE: Security and Watermarking of Multime-dia Contents, San Jose, CA, Jan. 1999, vol. 3657, pp. 342\u2013353.","journal-title":"Proceedings of SPIE: Security and Watermarking of Multime-dia Contents"},{"key":"310967_CR23","unstructured":"J. Wolosewicz and K. Jemili, \u201cApparatus and Method for En-coding and Decoding Information in Analog Signals, \u201d United States Patent #5,828,325, Oct. 1998."},{"key":"310967_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3136-4","volume-title":"Digital Communication","author":"E.A. Lee","year":"1994","unstructured":"E.A. Lee and D.G. Messerschmitt, Digital Communication, 2nd edn., Boston, MA: Kluwer Academic Publishers, 1994.Quantization Index Modulation Methods 33","edition":"2nd edn."},{"key":"310967_CR25","volume-title":"Digital Coding of Waveforms: Princi-ples and Applications to Speech and Video","author":"N.S. Jayant","year":"1984","unstructured":"N.S. Jayant and P. Noll, Digital Coding of Waveforms: Princi-ples and Applications to Speech and Video, Englewood Cliffs, NJ: Prentice-Hall, 1984."},{"key":"310967_CR26","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1109\/18.508838","volume":"42","author":"R. Zamir","year":"1996","unstructured":"R. Zamir and M. Feder, \u201cOn Lattice Quantization Noise, \u201d IEEE Transactions on Information Theory, vol. 42, 1996, pp. 1152\u20131159.","journal-title":"IEEE Transactions on Information Theory"},{"key":"310967_CR27","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIT.1982.1056454","volume":"28","author":"G. Ungerboeck","year":"1982","unstructured":"G. Ungerboeck, \u201cChannel Coding With Multilevel\/Phase Sig-nals, \u201d IEEE Transactions on Information Theory, vol. 28, 1982, pp. 55\u201367.","journal-title":"IEEE Transactions on Information Theory"},{"key":"310967_CR28","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TIT.1972.1054727","volume":"18","author":"T.M. Cover","year":"1972","unstructured":"T.M. Cover, \u201cBroadcast Channels, \u201d IEEE Transactions on In-formation Theory, vol. 18, 1972, pp. 2\u201314.","journal-title":"IEEE Transactions on In-formation Theory"},{"key":"310967_CR29","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/49.210540","volume":"11","author":"K. Ramchandran","year":"1993","unstructured":"K. Ramchandran, A. Ortega, K.M. Uz, and M. Vetterli, \u201cMultiresolution Broadcast for Digital HDTV Using Joint Source\/Channel Coding, \u201d IEEE Journal on Selected Areas in Communications, vol. 11, 1993, pp. 6\u201323.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"310967_CR30","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"T.M. Cover and J.A. Thomas, Elements of Information Theory, New York, NY: John Wiley & Sons, 1991."},{"key":"310967_CR31","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"IT-29","author":"M.H.M. Costa","year":"1983","unstructured":"M.H.M. Costa, \u201cWriting on Dirty Paper, \u201d IEEE Transactions on Information Theory, vol. IT-29, 1983, pp. 439\u2013441.","journal-title":"IEEE Transactions on Information Theory"},{"key":"310967_CR32","unstructured":"P. Moulin and J.A. O'Sullivan, \u201cInformation-theoretic analysis of information hiding, \u201d Preprint, 1999."},{"issue":"1","key":"310967_CR33","first-page":"19","volume":"9","author":"S.I. Gel'fand","year":"1980","unstructured":"S.I. Gel'fand and M.S. Pinsker, \u201cCoding for Channel with Ran-dom Parameters, \u201d Problems of Control and Information Theory, vol. 9, no. 1, 1980, pp. 19\u201331.","journal-title":"Problems of Control and Information Theory"},{"key":"310967_CR34","unstructured":"A.S. Willsky, G.W. Wornell, and J.H. Shapiro, \u201cStochastic Pro-cesses, Detection and Estimation, \u201d MIT 6.432 Supplementary Course Notes, Cambridge, MA, 1996."},{"key":"310967_CR35","volume-title":"Error Control Coding: Funda-mentals and Applications","author":"S. Lin","year":"1983","unstructured":"S. Lin and D.J. Costello,Jr., Error Control Coding: Funda-mentals and Applications, Englewood Cliffs, NJ: Prentice-Hall, 1983."},{"key":"310967_CR36","unstructured":"R.J. Barron, B. Chen, and G.W. Wornell, \u201cThe Duality Between Information Embedding and Source Coding with Side Informa-tion and Its Implications and Applications, \u201d IEEE Transactions on Information Theory, submitted."},{"key":"310967_CR37","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1117\/12.371232","volume":"3845","author":"B. Chen","year":"1999","unstructured":"B. Chen and G.W. Wornell, \u201cProvably Robust Digital Water-marking, \u201d in Proceedings of SPIE: Multimedia Systems and Ap-plications II, Boston, MA, Sept. 1999, vol. 3845, pp. 43\u201354.","journal-title":"Proceedings of SPIE: Multimedia Systems and Ap-plications II"}],"container-title":["Journal of VLSI signal processing systems for signal, image and video technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008107127819.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008107127819\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008107127819.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T09:46:09Z","timestamp":1754905569000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008107127819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,2]]},"references-count":37,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2001,2]]}},"alternative-id":["310967"],"URL":"https:\/\/doi.org\/10.1023\/a:1008107127819","relation":{},"ISSN":["0922-5773"],"issn-type":[{"value":"0922-5773","type":"print"}],"subject":[],"published":{"date-parts":[[2001,2]]},"assertion":[{"value":"1 February 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}