{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:05:39Z","timestamp":1730250339327,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/icmlc.2015.7340945","type":"proceedings-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T16:12:04Z","timestamp":1449159124000},"page":"340-345","source":"Crossref","is-referenced-by-count":0,"title":["Reversible data hiding for VQ indices using XOR operator and SOC codes"],"prefix":"10.1109","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[]},{"given":"Ying-Hsuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wei-Chi","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1145","article-title":"Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium","volume":"3","author":"chang","year":"2007","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1176-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.030"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.2.31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.09.036"},{"key":"ref15","article-title":"High payload image steganography with minimum distortion based on absolute moment block truncation coding","author":"ou","year":"2014","journal-title":"Multimedia Tools and Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.05.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.09.005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1046"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1984.1162229"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.03.088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.04.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2012.0233"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.12.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.047"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.12.021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.08.022"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2224052"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2014.08.012"}],"event":{"name":"2015 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2015,7,12]]},"location":"Guangzhou, China","end":{"date-parts":[[2015,7,15]]}},"container-title":["2015 International Conference on Machine Learning and Cybernetics (ICMLC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7329055\/7340881\/07340945.pdf?arnumber=7340945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:02:17Z","timestamp":1490392937000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7340945\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2015.7340945","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}