{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:30Z","timestamp":1750220910154,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3381271.3381301","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T15:59:45Z","timestamp":1582905585000},"page":"92-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Information hiding in scanned binary image of chinese characters"],"prefix":"10.1145","author":[{"given":"Wen","family":"Wen","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"21","volume-title":"2008 Image complexity and feature mining for steganalysis of least significant bit matching steganography Inf. Sci","author":"Liu Q.","unstructured":"Liu Q. et al 2008 Image complexity and feature mining for steganalysis of least significant bit matching steganography Inf. Sci . vol. 178 , pp. 21 -- 36 Liu Q. et al 2008 Image complexity and feature mining for steganalysis of least significant bit matching steganography Inf. Sci. vol.178, pp. 21--36"},{"key":"e_1_3_2_1_2_1","first-page":"352","volume-title":"2015 Least significant qubit (LSQb) information hiding algorithm for quantum image Measurement","author":"Wang S.","unstructured":"Wang S. et al 2015 Least significant qubit (LSQb) information hiding algorithm for quantum image Measurement vol. 73 , pp. 352 -- 359 Wang S. et al 2015 Least significant qubit (LSQb) information hiding algorithm for quantum image Measurement vol. 73, pp. 352--359"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.02.023"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"2008 International Conference","volume":"3","author":"Byun Jin-Yong","year":"2008","unstructured":"Jin-Yong Byun , Ki-Hyun Jun and Yoo Kee-Young , Improved Data Hiding Method by Block Parity for Binary Images ,\" in Computer Science and Software Engineering , 2008 International Conference , 2008 , vol. 3 , pp. 1 -- 5 . Jin-Yong Byun, Ki-Hyun Jun and Yoo Kee-Young, Improved Data Hiding Method by Block Parity for Binary Images,\" in Computer Science and Software Engineering, 2008 International Conference, 2008, vol.3, pp. 1--5."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2007.26"},{"key":"e_1_3_2_1_6_1","first-page":"66","volume-title":"First International Conference on Innovative Computing, Information and Control","volume":"1","author":"Li Zongqing","year":"2006","unstructured":"Zongqing Li and Haobin Zhang , A New Data Hiding Method in Binary Images , First International Conference on Innovative Computing, Information and Control , 2006 , vol. 1 , pp. 66 -- 69 Zongqing Li and Haobin Zhang, A New Data Hiding Method in Binary Images, First International Conference on Innovative Computing, Information and Control, 2006, vol.1, pp.66--69"},{"key":"e_1_3_2_1_7_1","first-page":"114","volume-title":"A new chain-coding algorithm for binary images using run-length codes, Computer Vision, Graphics, and Image Processing","author":"Kim Seong-Dae","year":"1988","unstructured":"Seong-Dae Kim , Jeong-Hwan Lee and Jae-Kyoon Kim , A new chain-coding algorithm for binary images using run-length codes, Computer Vision, Graphics, and Image Processing , 1988 , vol. 41 , pp. 114 -- 128 Seong-Dae Kim, Jeong-Hwan Lee and Jae-Kyoon Kim, A new chain-coding algorithm for binary images using run-length codes, Computer Vision, Graphics, and Image Processing, 1988, vol.41, pp.114--128"},{"key":"e_1_3_2_1_8_1","first-page":"104","article-title":"Binary jumbled string matching for highly run-length compressible texts","volume":"113","author":"Kroon Gabriele","year":"2013","unstructured":"Badkobeh, Golnaz, Fici, Gabriele and Kroon , Steve , Binary jumbled string matching for highly run-length compressible texts , Information Processing Letters , 2013 , 113 : 104 -- 108 . Badkobeh, Golnaz, Fici, Gabriele and Kroon, Steve, Binary jumbled string matching for highly run-length compressible texts, Information Processing Letters, 2013, 113:104--108.","journal-title":"Information Processing Letters"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761613"},{"issue":"5","key":"e_1_3_2_1_10_1","first-page":"207","article-title":"Fast algorithm of dilation and erosion for binary image","volume":"53","author":"Deng Shichao","year":"2017","unstructured":"Shichao Deng and Yin Huang , Fast algorithm of dilation and erosion for binary image , Computer Engineering and Applications , 2017 , 53 ( 5 ): 207 -- 211 Shichao Deng and Yin Huang, Fast algorithm of dilation and erosion for binary image, Computer Engineering and Applications, 2017, 53(5):207--211","journal-title":"Computer Engineering and Applications"}],"event":{"name":"ICMIP 2020: 2020 5th International Conference on Multimedia and Image Processing","sponsor":["NJU Nanjing University"],"location":"Nanjing China","acronym":"ICMIP 2020"},"container-title":["Proceedings of the 5th International Conference on Multimedia and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381271.3381301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3381271.3381301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:59Z","timestamp":1750203899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381271.3381301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":10,"alternative-id":["10.1145\/3381271.3381301","10.1145\/3381271"],"URL":"https:\/\/doi.org\/10.1145\/3381271.3381301","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-02-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}