{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:51:06Z","timestamp":1742799066595,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/isit.2005.1523325","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:51:59Z","timestamp":1160581919000},"page":"214-218","source":"Crossref","is-referenced-by-count":13,"title":["Semantic compaction, transmission, and compression codes"],"prefix":"10.1109","author":[{"given":"F.M.J.","family":"Willems","sequence":"first","affiliation":[]},{"given":"T.","family":"Kalker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2002.1027818"},{"key":"2","first-page":"19","article-title":"Coding for a channel with random parameters","volume":"9","author":"gelfand","year":"1980","journal-title":"Problems of Control and Information Theory"},{"key":"10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1090\/dimacs\/066\/04","article-title":"Coding theorems for for reversible embedding","volume":"66","author":"willems","year":"2004","journal-title":"DIMACS Series in Discrete Mathematics and Theoretical Computer Science"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"7","first-page":"303","article-title":"Trade-off between message and state information rates","author":"sutivong","year":"2001","journal-title":"Proc ISIT 2001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"4","article-title":"Capacity bounds and code constructions for reversible data-hiding","author":"kalker","year":"2003","journal-title":"IS & T \/ SPIE's 15th Ann Symp Electronic Imaging"},{"key":"9","article-title":"Methods for reversible embedding","author":"willems","year":"2002","journal-title":"Proc 40th Annual Allerton Conference on Communication Control and Computing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023498"}],"event":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","start":{"date-parts":[[2005,9,4]]},"location":"Adelaide, Australia","end":{"date-parts":[[2005,9,9]]}},"container-title":["Proceedings. International Symposium on Information Theory, 2005. ISIT 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10215\/32581\/01523325.pdf?arnumber=1523325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T16:42:47Z","timestamp":1555864967000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isit.2005.1523325","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}