{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T04:40:07Z","timestamp":1745124007021,"version":"3.40.4"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2003,7,1]],"date-time":"2003-07-01T00:00:00Z","timestamp":1057017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Mag."],"published-print":{"date-parts":[[2003,7]]},"DOI":"10.1109\/msp.2003.1215232","type":"journal-article","created":{"date-parts":[[2003,7,29]],"date-time":"2003-07-29T17:37:29Z","timestamp":1059500249000},"page":"59-70","source":"Crossref","is-referenced-by-count":17,"title":["Image processing for halftones focusing on inverse halftoning, compression, and watermarking"],"prefix":"10.1109","volume":"20","author":[{"family":"Ping Wah Wong","sequence":"first","affiliation":[]},{"given":"N.D.","family":"Memon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","volume-title":"Selected Papers on Digital Halftoning) SPIE Milestone Series","volume":"MS154","author":"Allebach","year":"1999"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2421.001.0001"},{"volume-title":"Digital Color Halftoning","year":"1999","author":"Kang","key":"ref3"},{"key":"ref4","first-page":"1437","article-title":"Still image compression and halftoning","volume-title":"The Communications Handbook","author":"Wong","year":"1996"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/b978-012119792-6\/50117-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/83.597271"},{"key":"ref7","first-page":"476","article-title":"Model-based halftoning via direct binary search","volume-title":"Proc. IS & T\u2019s 47th Annu. Conf.","author":"Allebach","year":"1994"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941332"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/83.641416"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/83.502397"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/83.370677"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1992.226238"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.1992.230484"},{"key":"ref14","first-page":"282","article-title":"A Bayesian approach to palette restoration","volume-title":"Proc. SPIE","volume":"1913","author":"Schweizer","year":"1993"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/83.336256"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/83.342186"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/83.791977"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/83.862639"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2002.1010034"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/78.668572"},{"volume-title":"Adaptive Signal Processing","year":"1985","author":"Widrow","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/83.298391"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/83.736675"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.1994.582898"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1995.515501"},{"key":"ref26","first-page":"223","article-title":"Combined halftoning and entropy-constrained vector quantization","volume-title":"SID Dig. Tech. Papers","author":"Vander Kam","year":"1993"},{"key":"ref27","first-page":"905","article-title":"Entropy constrained error diffusion","volume-title":"SID Dig. Tech. Papers","author":"Wong","year":"1995"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1038058"},{"journal-title":"J. Electron Imaging","article-title":"Token-based error diffusion for high quality halftoning with good compression and low complexity","author":"Lee","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1980.11751"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1147\/rd.232.0149"},{"issue":"2","key":"ref32","first-page":"103","article-title":"Technical features of the JBIG standard for progressive bi-level image compression","volume":"4","author":"Hampel","year":"1992","journal-title":"Signal Processing"},{"article-title":"Digital watermarking using conjugate halftone screens","year":"1998","author":"Knox","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1095052"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/83.918572"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/83.760309"},{"key":"ref37","first-page":"517","article-title":"Tree coding of bi-level images","volume-title":"IEEE Trans. Image Processing","volume":"7","author":"Martins","year":"1998"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1995.476344"},{"key":"ref39","article-title":"A fast segmentation agorithm for bi-level image compression using jbig2","volume-title":"Proc. IEEE Int. Conf. Image Processing","author":"Tompkins","year":"1999"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/5.3288"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055415"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2000.869623"},{"key":"ref43","first-page":"241","article-title":"Embedding robust labels into images for copyright protection","volume-title":"Proc. I(nowRight\u201995 Conf., Intellectual Property Rights and New Technologies","author":"Zhao"},{"key":"ref44","article-title":"A secure data hiding scheme for two-color images","volume-title":"IEEE Symp. Computers and Communications","author":"Pan","year":"2000"},{"key":"ref45","article-title":"Secure and invisible data hiding in 2-color images","volume-title":"IEEE Symp. Computers and Communications","author":"Tseng","year":"2000"},{"key":"ref46","article-title":"Multi-resolution binary image embedding","volume-title":"Proc. Conf Securityand Watermarking of Multimedia Contents in the SPIE\/IS & T Symp. Electronic Imaging","author":"Wong","year":"2003"},{"article-title":"Method and apparatus for halftone image embedding","year":"2003","author":"Wong","key":"ref47"},{"key":"ref48","first-page":"307","article-title":"Watermarking of dither haltoned images","volume-title":"Proc. SPIE","volume":"3657","author":"Baharav","year":"1999"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2001.918765"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1117\/12.384977"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2000.859304"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2001.922030"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/83.557360"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809369"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053419"},{"article-title":"Digital watermarking using conjugate halftone screens","year":"1998","author":"Wang","key":"ref56"}],"container-title":["IEEE Signal Processing Magazine"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/79\/27334\/01215232.pdf?arnumber=1215232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T04:03:15Z","timestamp":1745121795000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1215232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,7]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,7]]}},"URL":"https:\/\/doi.org\/10.1109\/msp.2003.1215232","relation":{},"ISSN":["1053-5888"],"issn-type":[{"type":"print","value":"1053-5888"}],"subject":[],"published":{"date-parts":[[2003,7]]}}}