{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:36:18Z","timestamp":1774942578917,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP Journal on Information Security"],"published-print":{"date-parts":[[2009]]},"DOI":"10.1155\/2009\/658047","type":"journal-article","created":{"date-parts":[[2009,5,27]],"date-time":"2009-05-27T09:46:39Z","timestamp":1243417599000},"page":"1-9","source":"Crossref","is-referenced-by-count":56,"title":["A Novel Image Data Hiding Scheme with Diamond Encoding"],"prefix":"10.1186","volume":"2009","author":[{"given":"Ruey-Ming","family":"Chao","sequence":"first","affiliation":[]},{"given":"Hsien-Chu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chih-Chiang","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yen-Ping","family":"Chu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/5.771066"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2004.838214"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.823822"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00515-1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.02.007"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/83.951543"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2002.801488"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.01.049"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.060863"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2003.10.014"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863485"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","deposited":{"date-parts":[[2011,3,18]],"date-time":"2011-03-18T07:10:51Z","timestamp":1300432251000},"score":1,"resource":{"primary":{"URL":"http:\/\/jis.eurasipjournals.com\/content\/2009\/1\/658047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":14,"alternative-id":["658047","658047"],"URL":"https:\/\/doi.org\/10.1155\/2009\/658047","relation":{},"ISSN":["1687-4161","1687-417X"],"issn-type":[{"value":"1687-4161","type":"print"},{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}