{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:52:04Z","timestamp":1774579924972,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/tcsvt.2013.2283431","type":"journal-article","created":{"date-parts":[[2013,9,25]],"date-time":"2013-09-25T18:27:01Z","timestamp":1380133621000},"page":"695-703","source":"Crossref","is-referenced-by-count":48,"title":["A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations"],"prefix":"10.1109","volume":"24","author":[{"family":"Ya-Lin Lee","sequence":"first","affiliation":[]},{"family":"Wen-Hsiang Tsai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","year":"0","journal-title":"Related images of the experiments"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s00373-007-0713-4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995331"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2007341"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","article-title":"Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection","volume":"20","author":"li","year":"2011","journal-title":"IEEE Trans Image Process"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2257814"},{"key":"ref15","first-page":"197","article-title":"Invertible authentication","volume":"3971","author":"fridrich","year":"0","journal-title":"Proc SPIE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.905146"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.922795"},{"key":"ref19","first-page":"187","article-title":"Fast estimation of optimal marked-signal distribution for reversible data hiding","volume":"8","author":"hu","year":"2013","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.11.090"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.05.027"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.09.035"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.10.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.05.011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540212"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.05.028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"ni","year":"2006","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref20","first-page":"34","author":"pennebaker","year":"1993","journal-title":"JPEG Still Image Data Compression Standard"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/38.946629"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1109\/TIFS.2011.2135853","article-title":"Secret-fragment-visible mosaic image&#x2014;A new computer art and its application to information hiding","volume":"6","author":"lai","year":"2011","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.884895"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.15.002036"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.01.019"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(00)00015-7"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/76\/6781564\/06609044.pdf?arnumber=6609044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:17:07Z","timestamp":1642004227000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6609044\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":32,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2013.2283431","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4]]}}}