{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T18:25:57Z","timestamp":1648664757362},"reference-count":13,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Signal Processing: Image Communication"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1016\/j.image.2003.10.005","type":"journal-article","created":{"date-parts":[[2003,12,19]],"date-time":"2003-12-19T07:14:35Z","timestamp":1071818075000},"page":"285-297","source":"Crossref","is-referenced-by-count":15,"title":["A progressive secret reveal system based on SPIHT image transmission"],"prefix":"10.1016","volume":"19","author":[{"given":"Piyu","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Yu-Chen","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.image.2003.10.005_BIB1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/4236.935180","article-title":"Digital steganography","volume":"5","author":"Artz","year":"2001","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/j.image.2003.10.005_BIB2","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","article-title":"A steganographic method based upon JPEG and quantization table modification","volume":"141","author":"Chang","year":"2002","journal-title":"Inform. Sci."},{"issue":"3","key":"10.1016\/j.image.2003.10.005_BIB3","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/6046.944472","article-title":"An adaptive approach to transform-domain information hiding and optimum detection structure","volume":"3","author":"Cheng","year":"2001","journal-title":"IEEE Trans. Multimedia"},{"issue":"9","key":"10.1016\/j.image.2003.10.005_BIB4","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1016\/S0167-8655(01)00044-7","article-title":"A novel SVD- and VQ-based image hiding scheme","volume":"22","author":"Chung","year":"2001","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"10.1016\/j.image.2003.10.005_BIB5","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"Hsu","year":"1999","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"10.1016\/j.image.2003.10.005_BIB6","first-page":"1469","article-title":"A method of embedding binary data into JPEG bitstreams","volume":"J83-D2","author":"Kobayashi","year":"2000","journal-title":"IEICE Trans."},{"issue":"3","key":"10.1016\/j.image.2003.10.005_BIB7","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1049\/ip-vis:20000341","article-title":"High capacity image steganographic model","volume":"147","author":"Lee","year":"2000","journal-title":"IEE Proc. Vision, Image Signal Process."},{"key":"10.1016\/j.image.2003.10.005_BIB8","unstructured":"H.K. Pan, Y.Y. Chen, Y.C. Tseng, A secure data hiding scheme for two-color images, IEEE Proceedings of the Fifth Symposium on Computers and Communications (ISCC 2000), Antibes, France, July 2000, pp. 750\u2013755."},{"issue":"3","key":"10.1016\/j.image.2003.10.005_BIB9","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/76.499834","article-title":"A new fast and efficient image coder based on set partitioning in hierarchical trees","volume":"6","author":"Said","year":"1996","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"10.1016\/j.image.2003.10.005_BIB10","doi-asserted-by":"crossref","first-page":"3445","DOI":"10.1109\/78.258085","article-title":"Embedded image coding using zerotree of wavelet coefficients","volume":"14","author":"Shapiro","year":"1993","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/j.image.2003.10.005_BIB11","doi-asserted-by":"crossref","first-page":"1579","DOI":"10.1016\/S0167-8655(02)00122-8","article-title":"BPCS steganography using EZW lossy compressed images","volume":"23","author":"Spaulding","year":"2002","journal-title":"Pattern Recogn. Lett."},{"key":"10.1016\/j.image.2003.10.005_BIB12","unstructured":"P. Tsai, Y.C. Hu, C.C. Chang, An image hiding technique using block truncation coding, Proceedings of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, July 2002, pp. 54\u201364."},{"issue":"3","key":"10.1016\/j.image.2003.10.005_BIB13","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","article-title":"Image hiding by optimal LSB substitution and genetic algorithm","volume":"34","author":"Wang","year":"2001","journal-title":"Pattern Recogn."}],"container-title":["Signal Processing: Image Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596503001450?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596503001450?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,15]],"date-time":"2019-02-15T21:22:53Z","timestamp":1550265773000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0923596503001450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["S0923596503001450"],"URL":"https:\/\/doi.org\/10.1016\/j.image.2003.10.005","relation":{},"ISSN":["0923-5965"],"issn-type":[{"value":"0923-5965","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}