{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:30:31Z","timestamp":1729657831893,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icmlc.2010.5580795","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T15:57:54Z","timestamp":1285171074000},"page":"2824-2828","source":"Crossref","is-referenced-by-count":4,"title":["A near reversible image watermarking algorithm"],"prefix":"10.1109","author":[{"given":"Bin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Xin-Xin","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Kai-Guo","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Hui-Bai","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/12.476858","article-title":"High Capacity Reversible Watermarking for Audio","volume":"5020","author":"van der veen","year":"2003","journal-title":"Proce SPIE"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1049\/el:20021131"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TCSVT.2009.2017401"},{"key":"ref6","first-page":"161","article-title":"Reversible Watermarking: Current Status and Key Issues","volume":"2","author":"feng","year":"2006","journal-title":"International Journal of Network Security"},{"key":"ref5","first-page":"ii-912","article-title":"Reversible Data Hiding","volume":"2","author":"ni","year":"2003","journal-title":"Proc IEEE ISCAS'03"},{"year":"2006","journal-title":"Proceedings of the 1st Distributed Diagnosis and Home Healthcare (D2H2) Conference Arlington","article-title":"A semi-reversible watermark for medical image authentication","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/IGARSS.2002.1026144"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1117\/12.435400","article-title":"Invertible Authentication","author":"fridrich","year":"2001","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents"},{"year":"2002","author":"fridrich","article-title":"Lossless data embedding new paradigm in digital watermarking EURASIP Journal on Applied Signal Processing-Special Issue on Emerging Applications of Multimedia Data Hiding","key":"ref9"},{"year":"1999","author":"honsinger","journal-title":"Reversible Recovery of an Original Image Containing Embedded Data","key":"ref1"}],"event":{"name":"2010 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2010,7,11]]},"location":"Qingdao, China","end":{"date-parts":[[2010,7,14]]}},"container-title":["2010 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5570011\/5580670\/05580795.pdf?arnumber=5580795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T10:22:55Z","timestamp":1497867775000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5580795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2010.5580795","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}