{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T20:59:12Z","timestamp":1709413152775},"reference-count":27,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Image Processing"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1049\/iet-ipr.2014.0321","type":"journal-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T15:40:22Z","timestamp":1406734822000},"page":"54-61","source":"Crossref","is-referenced-by-count":11,"title":["Semantic image compression based on data hiding"],"prefix":"10.1049","volume":"9","author":[{"given":"Xinpeng","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai UniversityShanghaiPeople's Republic of China"}]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefeiPeople's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2015,1]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"2004 42nd Annual Allerton Conf. on Communication Control and Computing Monticello Illinois USA F. Willems D. Maas T. Kalker Semantic lossless source coding 1411 1418"},{"key":"e_1_2_7_3_1","unstructured":"2005 Proc. Int. Symp. on Information Theory Adelaide Australia F. Willems T. Kalker Semantic compaction transmission and compression codes 214 218"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.842707"},{"key":"e_1_2_7_5_1","volume-title":"Steganography in digital media\u2013principles, algorithms, and applications","author":"Fridrich J.","year":"2010"},{"issue":"3","key":"e_1_2_7_6_1","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","article-title":"Matrix embedding for large payloads","volume":"1","author":"Fridrich J.","year":"2006","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"e_1_2_7_7_1","first-page":"650502.1","article-title":"Practical methods for minimizing embedding impact in steganography","volume":"6050","author":"Fridrich J.","year":"2007","journal-title":"Proc. SPIE"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855393"},{"issue":"3","key":"e_1_2_7_9_1","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1109\/TIT.2009.2039087","article-title":"Near\u2010optimal codes for information embedding in gray\u2010scale signals","volume":"56","author":"Zhang W.","year":"2010","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"e_1_2_7_10_1","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/TIFS.2008.2011082","article-title":"Asymptotic behavior of the ZZW embedding construction","volume":"4","author":"Fridrich J.","year":"2009","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"e_1_2_7_11_1","unstructured":"2001 Proc. of 4th Int. Workshop on Information Hiding Lecture Notes in Computer Science Springer\u2010Verlag M. Goljan J. Fridrich R. Du Distortion\u2010free data embedding 27 41"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2010.2046930"},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","first-page":"1966","DOI":"10.1016\/j.jss.2009.06.056","article-title":"A high capacity reversible data hiding scheme with edge prediction and difference expansion","volume":"82","author":"Wu H.\u2010C.","year":"2009","journal-title":"J. Syst. Softw."},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.891046"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859373"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.924600"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2008.2001984"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2009252"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.04.004"},{"issue":"2","key":"e_1_2_7_24_1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1049\/iet-ifs:20070004","article-title":"Reversible data\u2010embedding scheme using differences between original and predicted pixel values","volume":"2","author":"Chang C.\u2010C.","year":"2008","journal-title":"IET Inf. Secur."},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2008.12.017"},{"key":"e_1_2_7_26_1","doi-asserted-by":"crossref","first-page":"2911","DOI":"10.1016\/j.sigpro.2010.04.012","article-title":"A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification","volume":"90","author":"Hong W.","year":"2010","journal-title":"Signal Process."},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2035975"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2229262"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2014.0321","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ipr.2014.0321","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2014.0321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T20:21:56Z","timestamp":1610655716000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ipr.2014.0321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1049\/iet-ipr.2014.0321"],"URL":"https:\/\/doi.org\/10.1049\/iet-ipr.2014.0321","archive":["Portico"],"relation":{},"ISSN":["1751-9667","1751-9667"],"issn-type":[{"value":"1751-9667","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]}}}