{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T19:17:14Z","timestamp":1723058234915},"reference-count":18,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,4,1]]},"DOI":"10.1587\/transinf.2019edp7239","type":"journal-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T22:25:32Z","timestamp":1585693532000},"page":"850-865","source":"Crossref","is-referenced-by-count":1,"title":["Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Shi-Chei","family":"HUNG","sequence":"first","affiliation":[{"name":"Department of Computer Science, National Chiao Tung University"}]},{"given":"Da-Chun","family":"WU","sequence":"additional","affiliation":[{"name":"Department of Computer and Communication Engineering, National Kaohsiung University of Science and Technology"}]},{"given":"Wen-Hsiang","family":"TSAI","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Chiao Tung University"},{"name":"Department of Information Communication, Asia University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] A. Hertzmann, \u201cA Survey of Stroke-based Rendering,\u201d IEEE Computer Graphics &amp; Applications, vol.23, no.4, pp.70-81, Aug. 2003. 10.1109\/mcg.2003.1210867","DOI":"10.1109\/MCG.2003.1210867"},{"key":"2","unstructured":"[2] A. Hertzmann, \u201cPainterly rendering with curved brush strokes of multiple sizes,\u201d Proc. 1998 Int. Conf. on Computer Graphics &amp; Interactive Techniques (SIGGRAPH 1998), Orlando, FL, USA, pp.453-460, July 19-24, 1998. 10.1145\/280814.280951"},{"key":"3","unstructured":"[3] A. Hertzmann, \u201cFast paint texture,\u201d Proc. 2002 Int. Conf. on Computer Graphics &amp; Interactive Techniques (SIGGRAPH 2002),Annecy, France, pp.91-96, June 3-5, 2002."},{"key":"4","unstructured":"[4] A. Hausner, \u201cSimulating Decorative Mosaics,\u201d Proc. 2001 Int. Conf. on Computer Graphics &amp; Interactive Techniques (SIGGRAPH 2001), Los Angeles, CA, USA, pp.573-580, Aug. 12-17, 2001. 10.1145\/383259.383327"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] P.E. Haeberli, \u201cPaint by numbers: Abstract image representations,\u201d F. Baskett, ed., Computer Graphics (SIGGRAPH&apos;90 Proceedings), vol.24, pp.207-214, Aug. 1990.","DOI":"10.1145\/97880.97902"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] N. Matsumura, H. Tokura, Y. Kuroda, Y. Ito, and K. Nakano, \u201cTile Art Image Generation Using Conditional Generative Adversarial Networks,\u201d Proc. 6th Int. Symp. on Computing &amp; Networking Workshops (CANDARW 2018), Takayama, Japan, pp.209-215, Nov. 27-30, 2018. 10.1109\/candarw.2018.00047","DOI":"10.1109\/CANDARW.2018.00047"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] D. Chen, L. Yuan, J. Liao, N. Yu, and G. Hua, \u201cStyleBank: An Explicit Representation for Neural Image Style Transfer,\u201d Proc. IEEE Conf. on Computer Vision &amp; Pattern Recognition, Honolulu, HI, USA, pp.2770-2779, July 21-26, 2017. 10.1109\/cvpr.2017.296","DOI":"10.1109\/CVPR.2017.296"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] L.A. Gatys, A.S. Ecker, and M. Bethge, \u201cImage Style Transfer Using Convolutional Neural Networks,\u201d Proc. 2016 IEEE Conf. on Computer Vison &amp; Pattern Recognition, Las Vegas, NV, USA, pp.2414-2423, June 27-30, 2016. 10.1109\/cvpr.2016.265","DOI":"10.1109\/CVPR.2016.265"},{"key":"9","unstructured":"[9] J. Osborne, Stained Glass in England, Alan Sutton Publishing, Phoenix Mill, Ltd., Mumbai, India, 1997."},{"key":"10","unstructured":"[10] D. Mould, \u201cA stained glass image filter,\u201d Proc. 14th Eurographics Workshop on Rendering, Leuven, Belgium, pp.20-25, June 25-27, 2003."},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] Y.-L. Lee and W.-H. Tsai, \u201cA New Data Transfer Method via Signal-rich-art Code Images Captured by Mobile Devices,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.25, no.4, pp.688-700, 2015. 10.1109\/tcsvt.2014.2355693","DOI":"10.1109\/TCSVT.2014.2355693"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M.A.N.I. Fahim and S. Hossain, \u201cA Simple Way to Create Pointillistic Art from Natural Images,\u201d Proc. 3rd IEEE Int. Conf. on Cybernetics (CYBCONF-2017), Exeter, UK, pp.1-5, Feb. 24, 2017. 10.1109\/cybconf.2017.7985751","DOI":"10.1109\/CYBConf.2017.7985751"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] F. Ernawan, M.N. Kabir, and Z. Mustaffa, \u201cA Blind Watermarking Technique Based on DCT Psychovisual Threshold for a Robust Copyright Protection,\u201d Proc. 12th Int. Conf. for Internet Technol. &amp; Secured Transactions (ICITST 2017), Cambridge, UK, pp.92-97, Dec. 11-14, 2017. 10.23919\/icitst.2017.8356354","DOI":"10.23919\/ICITST.2017.8356354"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] S.P. Singh and G. Bhatnagar, \u201cA robust watermarking scheme based on image normalization,\u201d Proc. 2018 IEEE 14th Int. Colloquium on Signal Processing &amp; Its Applications (CSPA 2018), Batu Ferringhi, Malaysia, pp.140-144, March 9-10, 2018. 10.1109\/cspa.2018.8368701","DOI":"10.1109\/CSPA.2018.8368701"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] C.-K. Chan and L.M. Cheng, \u201cHiding Data in Images by Simple LSB Substitution,\u201d Pattern Recognition, vol.37, no.3, pp.469-474, 2004. 10.1016\/j.patcog.2003.08.007","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] C.-W. Lee, \u201cMultipurpose Protection for Numeric Data with Capabilities of Self-Authentication and Ownership Declaration,\u201d IEEE Access, vol.6, pp.71152-71167, 2018. 10.1109\/access.2018.2880609","DOI":"10.1109\/ACCESS.2018.2880609"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] Y.-S. Chen and R.-Z. Wang, \u201cReversible Authentication and Cross-Recovery of Images Using (t, n)-Threshold and Modified-RCM Watermarking,\u201d Optics Communications, vol.284, no.12, pp.2711-2719, 2001. 10.1016\/j.optcom.2011.01.058","DOI":"10.1016\/j.optcom.2011.01.058"},{"key":"18","unstructured":"[18] S.-C. Hung, D.-C. Wu, and W.-H. Tsai, \u201cData Hiding in Stained Glass Images,\u201d Proc. 2005 Int. Symp. on Intelligent Signal Processing &amp; Communications Syst., pp.129-132, Hong Kong, Dec. 13-16, 2005. 10.1109\/ispacs.2005.1595363"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/4\/E103.D_2019EDP7239\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T03:28:27Z","timestamp":1585970907000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/4\/E103.D_2019EDP7239\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edp7239","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}