{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T18:40:42Z","timestamp":1772131242049,"version":"3.50.1"},"reference-count":3,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Romanian Executive Agency for Higher Education, Research, Development and Innovation","award":["PN-II-PT-PCCA-2013-4-0201"],"award-info":[{"award-number":["PN-II-PT-PCCA-2013-4-0201"]}]},{"name":"Romanian Executive Agency for Higher Education, Research, Development and Innovation","award":["PN-IIPT-PCCA-2011-3.2-1162"],"award-info":[{"award-number":["PN-IIPT-PCCA-2011-3.2-1162"]}]},{"name":"Romanian Executive Agency for Higher Education, Research, Development and Innovation","award":["PNII-PT-PCCA-2013-4-1762"],"award-info":[{"award-number":["PNII-PT-PCCA-2013-4-1762"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/tip.2016.2549458","type":"journal-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T18:13:41Z","timestamp":1459448021000},"page":"2420-2422","source":"Crossref","is-referenced-by-count":116,"title":["Adaptive Pairing Reversible Watermarking"],"prefix":"10.1109","volume":"25","author":[{"given":"Ioan-Catalin","family":"Dragoi","sequence":"first","affiliation":[]},{"given":"Dinu","family":"Coltuc","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref3","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2281422"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/83\/7435413\/07445233.pdf?arnumber=7445233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:11:05Z","timestamp":1642003865000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7445233\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":3,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tip.2016.2549458","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5]]}}}