{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T14:41:27Z","timestamp":1720449687125},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T00:00:00Z","timestamp":1555372800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T00:00:00Z","timestamp":1555372800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-019-7600-x","type":"journal-article","created":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T00:02:43Z","timestamp":1555372963000},"page":"22331-22350","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["High-payload secret hiding mechanism for QR codes"],"prefix":"10.1007","volume":"78","author":[{"given":"Peng-Cheng","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yung-Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanjun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,16]]},"reference":[{"key":"7600_CR1","doi-asserted-by":"crossref","unstructured":"Bui TV, Vu NK, Nguyen TT, Echizen I, Nguyen TD (2014) Robust message hiding for QR code. In: 2014 Tenth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP). IEEE, pp 520\u2013523","DOI":"10.1109\/IIH-MSP.2014.135"},{"key":"7600_CR2","doi-asserted-by":"crossref","unstructured":"Chang CC, Liu Y, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on. IEEE, pp 89\u201393","DOI":"10.1109\/IIH-MSP.2014.29"},{"issue":"10","key":"7600_CR3","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.3837\/tiis.2013.10.012","volume":"7","author":"Y-J Chiang","year":"2013","unstructured":"Chiang Y-J, Lin P-Y, Wang R-Z, Chen Y-H (2013) Blind QR code Steganographic approach based upon error correction capability. KSII Transactions on Internet & Information Systems 7(10):2527\u20132543","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"7600_CR4","unstructured":"Cox R (2012) Qart codes. \n http:\/\/research.swtch.com\/qart\n \n . Accessed Dec. 2012"},{"issue":"1","key":"7600_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/18.61123","volume":"37","author":"P Elias","year":"1991","unstructured":"Elias P (1991) Error-correcting codes for list decoding. IEEE Trans Inf Theory 37(1):5\u201312","journal-title":"IEEE Trans Inf Theory"},{"key":"7600_CR6","unstructured":"Erlangga W, Barmawi AM (2016) Increasing secret data hiding capacity in QR code using 3 times 3 subcells. In: International workshop on digital watermarking. Springer, pp 327\u2013342"},{"issue":"10","key":"7600_CR7","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J Fridrich","year":"2005","unstructured":"Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923\u20133935","journal-title":"IEEE Trans Signal Process"},{"issue":"1","key":"7600_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TIFS.2005.863487","volume":"1","author":"J Fridrich","year":"2006","unstructured":"Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Forensics and Security 1(1):102\u2013110","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7600_CR9","doi-asserted-by":"crossref","unstructured":"Huang P-C, Li Y-H, Chang C-C, Liu Y (2018) Efficient scheme for secret hiding in QR code by improving exploiting modification direction. KSII Transactions on Internet & Information Systems 12(5)","DOI":"10.3837\/tiis.2018.05.024"},{"key":"7600_CR10","unstructured":"Inc. D-W (2003) QR code standardization. \n www.qrcode.com\/en\/about\/standards.html\n \n . Accessed 24 Nov. 2017"},{"key":"7600_CR11","unstructured":"Lin P-Y, Chen Y-H (2016) QR code steganography with secret payload enhancement. In: 2016 IEEE international conference on multimedia & expo workshops (ICMEW), Seattle, USA. IEEE, pp 1\u20135"},{"issue":"1","key":"7600_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1186\/s13640-016-0155-0","volume":"2017","author":"P-Y Lin","year":"2017","unstructured":"Lin P-Y, Chen Y-H (2017) High payload secret hiding technology for QR codes. EURASIP Journal on Image and Video Processing 2017(1):14","journal-title":"EURASIP Journal on Image and Video Processing"},{"issue":"2","key":"7600_CR13","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1049\/iet-ipr.2014.1015","volume":"10","author":"Y Liu","year":"2016","unstructured":"Liu Y, Chang C-C, Nguyen T-S (2016) High capacity turtle shell-based data hiding. IET Image Process 10(2):130\u2013137","journal-title":"IET Image Process"},{"issue":"10","key":"7600_CR14","doi-asserted-by":"publisher","first-page":"12233","DOI":"10.1007\/s11042-016-3624-7","volume":"76","author":"L Liu","year":"2017","unstructured":"Liu L, Chang C-C, Wang A (2017) Data hiding based on extended turtle shell matrix construction method. Multimed Tools Appl 76(10):12233\u201312250","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"7600_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE signal processing letters 13(5):285\u2013287","journal-title":"IEEE signal processing letters"},{"key":"7600_CR16","doi-asserted-by":"crossref","unstructured":"Teraura N, Sakurai K (2012) Information hiding in subcells of a two-dimensional code. In: 2012 IEEE 1st Global Conference on consumer electronics (GCCE), IEEE, pp 652\u2013656","DOI":"10.1109\/GCCE.2012.6379943"},{"issue":"3","key":"7600_CR17","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/TIFS.2015.2506546","volume":"11","author":"I Tkachenko","year":"2016","unstructured":"Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin J-M, Guichard C (2016) Two-level QR code for private message sharing and document authentication. IEEE Transactions on Information Forensics and Security 11(3):571\u2013583","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"7600_CR18","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7600-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7600-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7600-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T10:06:33Z","timestamp":1589882793000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7600-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,16]]},"references-count":18,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7600"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7600-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,16]]},"assertion":[{"value":"28 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}