{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:23:28Z","timestamp":1725542608273},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642111631"},{"type":"electronic","value":"9783642111648"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-11164-8_67","type":"book-chapter","created":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T17:15:37Z","timestamp":1260810937000},"page":"414-419","source":"Crossref","is-referenced-by-count":2,"title":["Hidden QIM Watermarking on Compressed Data Using Channel Coding and Lifting"],"prefix":"10.1007","author":[{"given":"Santi P.","family":"Maity","sequence":"first","affiliation":[]},{"given":"Claude","family":"Delpha","sequence":"additional","affiliation":[]},{"given":"Sofiane","family":"Braci","sequence":"additional","affiliation":[]},{"given":"R\u00e9my","family":"Boyer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","first-page":"747","volume":"13","author":"P.H. Wong","year":"2003","unstructured":"Wong, P.H., Au, O.C.: A capacity estimation technique for JPEG-to-JPEG image watermarking. IEEE Trans. on Cir. & Sys. for Video Tech.\u00a013, 747\u2013752 (2003)","journal-title":"IEEE Trans. on Cir. & Sys. for Video Tech."},{"key":"67_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"G.C. Langelaar","year":"2000","unstructured":"Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Proc. Mag.\u00a017, 20\u201346 (2000)","journal-title":"IEEE Signal Proc. Mag."},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Chen, Q., Pathak, V.: Lossless data embedding with file size preservation. In: Proc. EI, Security, Steganography, Watermarking Multimedia Contents VI, vol.\u00a05306, pp. 354\u2013365 (2004)","DOI":"10.1117\/12.525418"},{"key":"67_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/LSP.2005.845606","volume":"12","author":"B.J. Mobasseri","year":"2005","unstructured":"Mobasseri, B.J., Berger, R.J.: A foundation for watermarking in compressed domain. IEEE Signal Proc. Lett.\u00a012, 399\u2013402 (2005)","journal-title":"IEEE Signal Proc. Lett."},{"key":"67_CR5","unstructured":"Choi, Y., Aizawa, K.: Digital watermarking using interblock correlation. In: Proc. IEEE Int. Conf. Inf. Tech.:Coding and Compr., pp. 133\u2013138 (2000)"},{"key":"67_CR6","unstructured":"Luo, W., Heileman, G.L., Pizano, C.E.: Fast and robust watermarking for JPEG files. In: Proc. IEEE 5th Southwest Symp. Image Anal. and Interp., pp. 158\u2013162 (2002)"},{"key":"67_CR7","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TSP.2004.839911","volume":"53","author":"G. Wu","year":"2005","unstructured":"Wu, G., Yang, E.H.: Joint watermarking and compression using scalar quantization for maximizing robustness in the presence of additive gaussian attacks. IEEE Tran. Signal Proc.\u00a053, 834\u2013844 (2005)","journal-title":"IEEE Tran. Signal Proc."},{"key":"67_CR8","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/83.846244","volume":"9","author":"M.D. Adams","year":"2000","unstructured":"Adams, M.D., Kossentini, F.: Reversible integer-to-integer wavelet transforms for image compression: performance evaluation and analysis. IEEE Trans. Image Proc.\u00a09, 1010\u20131024 (2000)","journal-title":"IEEE Trans. Image Proc."},{"key":"67_CR9","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Th.\u00a047, 1423\u20131443 (2001)","journal-title":"IEEE Trans. on Information Th."},{"key":"67_CR10","doi-asserted-by":"crossref","unstructured":"Voloshynovskiy, S., Pun, T.: Capacity security analysis of data hiding technologies. In: Proc. IEEE Int. Conf. Multimedia and Expo., Laussanne, Switzerland, pp. 477\u2013480 (2002)","DOI":"10.1109\/ICME.2002.1035649"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11164-8_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:46:06Z","timestamp":1619768766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11164-8_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642111631","9783642111648"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11164-8_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}