{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:23:00Z","timestamp":1729642980189,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/isccsp.2012.6217807","type":"proceedings-article","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T15:12:13Z","timestamp":1340982733000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Reversible data embedding for any digital signal"],"prefix":"10.1109","author":[{"given":"Mustafa S. Abdul","family":"Karim","sequence":"first","affiliation":[]},{"given":"Kok Sheik","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Kiyoshi","family":"Tanaka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SOUTHC.1996.535064"},{"key":"2","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","article-title":"Watermarking of uncompressed and compressed video","volume":"66","author":"hartung","year":"1998","journal-title":"Signal Processing"},{"key":"10","first-page":"309","article-title":"A data hiding technique in JPEG compressed domain","volume":"4314","author":"wong","year":"2001","journal-title":"Proceedings of SPIE - The International Society for Optical Engineering"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00122-X"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2033624"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/6046.923822"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/83.855427"},{"key":"9","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","article-title":"F5-A steganographic algorithm: High capacity despite better steganalysis","author":"westfeld","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2035227"}],"event":{"name":"2012 5th International Symposium on Communications, Control and Signal Processing (ISCCSP)","start":{"date-parts":[[2012,5,2]]},"location":"Roma, Italy","end":{"date-parts":[[2012,5,4]]}},"container-title":["2012 5th International Symposium on Communications, Control and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209478\/6217749\/06217807.pdf?arnumber=6217807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T16:46:25Z","timestamp":1497977185000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6217807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isccsp.2012.6217807","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}