{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T15:43:28Z","timestamp":1648827808269},"reference-count":32,"publisher":"SPIE-Intl Soc Optical Eng","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Electron. Imaging"],"published-print":{"date-parts":[[2010,1,1]]},"DOI":"10.1117\/1.3295710","type":"journal-article","created":{"date-parts":[[2010,2,9]],"date-time":"2010-02-09T23:03:50Z","timestamp":1265756630000},"page":"013003","source":"Crossref","is-referenced-by-count":4,"title":["Multithreshold progressive image sharing with compact shadows"],"prefix":"10.1117","volume":"19","author":[{"given":"Lee Shu-Teng","family":"Chen","sequence":"first","affiliation":[]}],"member":"189","reference":[{"key":"10.1117\/1.3295710_r1","unstructured":"G. R. Blakley , \u201cSafeguarding cryptographic keys,\u201dProc. AFIPS National Computer Conf.48, 313\u2013317 (1979)."},{"key":"10.1117\/1.3295710_r2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"10.1117\/1.3295710_r3","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1109\/TIT.1998.705566","volume":"44","author":"Beimel","year":"1998","journal-title":"IEEE Trans. Inf. Theory","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1117\/1.3295710_r4","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"10.1117\/1.3295710_r5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.819176"},{"key":"10.1117\/1.3295710_r6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00259-3"},{"key":"10.1117\/1.3295710_r7","doi-asserted-by":"publisher","DOI":"10.1117\/1.1588661"},{"key":"10.1117\/1.3295710_r8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.001"},{"key":"10.1117\/1.3295710_r9","doi-asserted-by":"publisher","DOI":"10.1117\/1.2955502"},{"key":"10.1117\/1.3295710_r10","doi-asserted-by":"crossref","unstructured":"D. C. Wu and W. H. Tsai , \u201cSpatial-domain image hiding using image differencing,\u201dIEE Proc. Vision, Image, Signal Process.147(1), 29\u201337 (2000).","DOI":"10.1049\/ip-vis:20000104"},{"key":"10.1117\/1.3295710_r11","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"10.1117\/1.3295710_r12","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00239-5"},{"key":"10.1117\/1.3295710_r13","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00221-8"},{"key":"10.1117\/1.3295710_r14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.01.002"},{"key":"10.1117\/1.3295710_r15","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.04.059"},{"key":"10.1117\/1.3295710_r16","doi-asserted-by":"publisher","DOI":"10.1117\/1.2395925"},{"key":"10.1117\/1.3295710_r17","doi-asserted-by":"publisher","DOI":"10.1117\/1.2911719"},{"key":"10.1117\/1.3295710_r18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.09.004"},{"key":"10.1117\/1.3295710_r19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.04.002"},{"key":"10.1117\/1.3295710_r20","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2006.12.012"},{"key":"10.1117\/1.3295710_r21","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00093-7"},{"key":"10.1117\/1.3295710_r22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905528"},{"key":"10.1117\/1.3295710_r23","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"},{"key":"10.1117\/1.3295710_r24","first-page":"121","volume":"4","author":"Ahmed","year":"2007","journal-title":"Informatica","ISSN":"http:\/\/id.crossref.org\/issn\/0350-5596","issn-type":"print"},{"key":"10.1117\/1.3295710_r25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.11.090"},{"key":"10.1117\/1.3295710_r26","unstructured":"W. B. Pennebaker and J. L. Mitchell ,JPEG Still Image Data Compression Standard, Van Nostrand Reinhold, New York (1993)."},{"key":"10.1117\/1.3295710_r27","unstructured":"L. S. T. Chen, S. J. Lin, and J. C. Lin , \u201cReversible JPEG-based hiding method with high hiding-ratio,\u201d accepted by Int. J. Pattern Recognit. Artif. Intell. (in press)."},{"key":"10.1117\/1.3295710_r28","unstructured":"Fourth public release of Independent JPEG Group\u2019s free JPEG software, available at http:\/\/packetstormsecurity.nl\/crypt\/stego\/jpeg-steg\/jpeg-v4.tar.gz."},{"key":"10.1117\/1.3295710_r29","doi-asserted-by":"publisher","DOI":"10.1007\/b104121"},{"key":"10.1117\/1.3295710_r30","unstructured":"S. Guillermito , Chi-square steganography test program, available at http:\/\/www.guillermito2.net\/stegano\/tools\/index.html (2004)."},{"key":"10.1117\/1.3295710_r31","unstructured":"M. T. Raggo , StegSpy steganography test program, http:\/\/www.spy-hunter.com\/stegspydownload.htm (2002)."},{"key":"10.1117\/1.3295710_r32","unstructured":"JPegX hiding tool, available at http:\/\/www.globalfreeware.com\/Jpegx-211.html."}],"container-title":["Journal of Electronic Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?articleid=1100462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T21:39:13Z","timestamp":1558820353000},"score":1,"resource":{"primary":{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?doi=10.1117\/1.3295710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,1]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1,1]]}},"URL":"https:\/\/doi.org\/10.1117\/1.3295710","relation":{},"ISSN":["1017-9909"],"issn-type":[{"value":"1017-9909","type":"print"}],"subject":[],"published":{"date-parts":[[2010,1,1]]}}}