{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:27:42Z","timestamp":1730251662890,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/icnidc.2012.6418808","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:53:56Z","timestamp":1359568436000},"page":"521-525","source":"Crossref","is-referenced-by-count":5,"title":["Reversible watermarking based on invariant sum value for 2D vector maps"],"prefix":"10.1109","author":[{"given":"Mingqin","family":"Geng","sequence":"first","affiliation":[]},{"given":"Puyi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hongmei","family":"Han","sequence":"additional","affiliation":[]},{"given":"Zhengcen","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yifu","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2009.00990"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1022431.1022459"},{"key":"12","first-page":"206","article-title":"Study on lossless data hiding algorithm for digital vector maps","volume":"2","author":"shao","year":"2007","journal-title":"Journal of Image and Graphics"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"2","first-page":"197","article-title":"Invertible authentication","volume":"4314","author":"fridrich","year":"2001","journal-title":"Proceedings of SPIE - The International Society for Optical Engineering"},{"journal-title":"Lossless recovery of an original image containing embedded data","year":"2001","author":"honsinger","key":"1"},{"key":"10","first-page":"91","article-title":"Reversible data hiding by coefficient-bias algorithm","volume":"1","author":"yang","year":"2010","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"7","first-page":"561","article-title":"Simple reversible watermarking schemes","volume":"5681","author":"coltuc","year":"2005","journal-title":"Proceedings of SPIE - The International Society for Optical Engineering"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1247008"},{"key":"5","first-page":"19","article-title":"Reversible watermarking by difference expansion","author":"tian","year":"2002","journal-title":"Proceedings of Workshop on Multimedia and Security Authentication Secrecy and Steganalysis"},{"key":"4","first-page":"912","article-title":"Reversible data hiding","volume":"2","author":"ni","year":"2003","journal-title":"Proc International Symposium on Circuits and Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.891046"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2008.2001984"}],"event":{"name":"2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2012)","start":{"date-parts":[[2012,9,21]]},"location":"Beijing, China","end":{"date-parts":[[2012,9,23]]}},"container-title":["2012 3rd IEEE International Conference on Network Infrastructure and Digital Content"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410480\/6418700\/06418808.pdf?arnumber=6418808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:46:26Z","timestamp":1490114786000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6418808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icnidc.2012.6418808","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}