{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:15:53Z","timestamp":1729646153112,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icip.2003.1246728","type":"proceedings-article","created":{"date-parts":[[2004,6,3]],"date-time":"2004-06-03T20:14:56Z","timestamp":1086293696000},"page":"II-507-10","source":"Crossref","is-referenced-by-count":2,"title":["A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques"],"prefix":"10.1109","volume":"3","author":[{"given":"H.T.","family":"Sencar","sequence":"first","affiliation":[]},{"given":"M.","family":"Ramkumar","sequence":"additional","affiliation":[]},{"given":"A.N.","family":"Akansu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.2002.808134"},{"key":"ref3","first-page":"19","article-title":"Coding for channel with random parameters","volume":"9","author":"gelfand","year":"1980","journal-title":"Problems of Control and Information Theory"},{"key":"ref10","article-title":"Provably robust digital watermarking","volume":"3845","author":"chen","year":"1998","journal-title":"Proc SPIE Multimedia Systems and Applications"},{"key":"ref6","article-title":"A robust optimization solution to the data hiding problem using distributed source coding principles","volume":"3974","author":"chou","year":"2000","journal-title":"Proc SPIE Image and Video Communications and Processing"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIT.2002.1003844"},{"key":"ref8","article-title":"Self-noise suppression schemes for blind image steganography","volume":"3845","author":"ramkumar","year":"1999","journal-title":"Proc SPIE International Workshop on Voice Video and Data Communication Multimedia Applications"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1117\/12.384995","article-title":"Preprocessed and postprocessed quantization index modulation methods for digital watermarking","volume":"3971","author":"chen","year":"2000","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref9","first-page":"4\/1","article-title":"a blind watermarking scheme based on structured codebooks","author":"eggers","year":"2000","journal-title":"IEE Seminar on Secure Images and Image Authentication"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TIT.1983.1056659"}],"event":{"acronym":"ICIP-03","name":"International Conference on Image Processing","location":"Barcelona, Spain"},"container-title":["Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8824\/27931\/01246728.pdf?arnumber=1246728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:46:56Z","timestamp":1497599216000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1246728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icip.2003.1246728","relation":{},"subject":[]}}