{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:54Z","timestamp":1725808434493},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_12","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"105-112","source":"Crossref","is-referenced-by-count":9,"title":["Image Steganography \u2013 Least Significant Bit with Multiple Progressions"],"prefix":"10.1007","author":[{"given":"Savita","family":"Goel","sequence":"first","affiliation":[]},{"given":"Shilpi","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Nisha","family":"Kaushik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Wolfgang, R., Delp, E.: A watermark for digital images. In: Proceedings of the IEEE International Conference on Image Processing, pp. 219\u2013222 (1996)","key":"12_CR1"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"N.F. Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer\u00a031(2), 26\u201334 (1998)","journal-title":"IEEE Computer"},{"unstructured":"Marvel, L.M., Retter, C.T.: A Methodology for Data Hiding Using Images. In: Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1044\u20131047 (1998)","key":"12_CR3"},{"issue":"4","key":"12_CR4","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications\u00a016(4), 474\u2013481 (1998)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"unstructured":"Eason, R.O., Kawaguchi, E.: Principle and applications of bpcs-steganography. In: Proceedings of SPIE, vol.\u00a03528, pp. 464\u2013473 (1998)","key":"12_CR5"},{"doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Grayscale and Color Images. In: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, pp. 27\u201330 (2001)","key":"12_CR6","DOI":"10.1145\/1232454.1232466"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"C.F. Lin","year":"2001","unstructured":"Lin, C.F., Wang, R.Z., Lin, J.C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition\u00a034, 671\u2013683 (2001)","journal-title":"Pattern Recognition"},{"unstructured":"Avcibas, I., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. In: Proceedings of the International Conference on Image Processing, pp. 24\u201328 (2002)","key":"12_CR8"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogeg, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Security and Privacy\u00a01(3), 32\u201344 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1016\/S0031-3203(02)00289-3","volume":"36","author":"J.Y. Hsiao","year":"2003","unstructured":"Hsiao, J.Y., Chang, C.C., Chan, C.-S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition\u00a036, 1583\u20131595 (2003)","journal-title":"Pattern Recognition"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D.C. Wu","year":"2003","unstructured":"Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters\u00a024, 1613\u20131626 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple lsb substitution. Pattern Recognition\u00a037, 469\u2013474 (2004)","journal-title":"Pattern Recognition"},{"unstructured":"Kong, X., Wang, Z., You, X.: Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm. In: Proceedings of 5th IEEE International Conference on Information, Communications and Signal Processing, pp. 860\u2013864 (2005)","key":"12_CR14"},{"issue":"22","key":"12_CR15","doi-asserted-by":"publisher","first-page":"3393","DOI":"10.1016\/j.ins.2006.02.008","volume":"176","author":"C.C. Chang","year":"2006","unstructured":"Chang, C.C., Lin, C.Y., Wang, Y.Z.: New image steganographic methods using run-length approach. Information Sciences\u00a0176(22), 3393\u20133408 (2006)","journal-title":"Information Sciences"},{"unstructured":"Battisti, F., Carli, M., Neri, A., Egiaziarian, K.: A Generalized Fibonacci LSB Data Hiding Technique. In: 3rd International Conference on Computers and Devices for Communication (CODEC 2006) TEA, Institute of Radio Physics and Electronics, University of Calcutta, December 18-20 (2006)","key":"12_CR16"},{"key":"12_CR17","volume-title":"Cryptography and Network Security","author":"A. Forouzan","year":"2007","unstructured":"Forouzan, A.: Cryptography and Network Security, 1st edn. McGraw-Hill, USA (2007)","edition":"1"},{"unstructured":"Sandipan, D., Ajith, A., Sugata, S.: An LSB Data Hiding Technique Using Prime Numbers. In: The Third International Symposium on Information Assurance and Security, Manchester, UK. IEEE CS Press (2007)","key":"12_CR18"},{"doi-asserted-by":"crossref","unstructured":"Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: Proceedings of the International Conference on Computer Engineering and Technology, pp. 588\u2013592 (2009)","key":"12_CR19","DOI":"10.1109\/ICCET.2009.40"},{"issue":"3","key":"12_CR20","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A. Cheddad","year":"2010","unstructured":"Cheddad, A., et al.: Digital image steganography: Survey and analysis of current methods. Signal Processing\u00a090(3), 727\u2013752 (2010)","journal-title":"Signal Processing"},{"doi-asserted-by":"crossref","unstructured":"Bhattacharyya, S., Khan, A., Nandi, A., Dasmalakar, A., Roy, S., Sanyal, G.: Pixel map-ping method (PMM) based bit plane complexity segmentation (BPCS) steganography. In: 2011 World Congress on Information and Communication Technologies (WICT), pp. 36\u201341 (2011)","key":"12_CR21","DOI":"10.1109\/WICT.2011.6141214"},{"unstructured":"Ghazanfari, K., Ghaemmaghami, S., Khosravi, S.R.: LSB++: An improvement to LSB+ steganography. In: IEEE Region Conference TENCON, pp. 364\u2013368 (2011)","key":"12_CR22"},{"doi-asserted-by":"crossref","unstructured":"Bansod, S.P., Mane, V.M., Ragha, L.R.: Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity. In: 2012 International Conference on Communication, Information & Computing Technology (ICCICT), pp. 1\u20136 (2012)","key":"12_CR23","DOI":"10.1109\/ICCICT.2012.6398199"},{"unstructured":"Kamble, M.V.: Information Hiding Technology- A Watermarking: Golden Research Thoughts (April 2012)","key":"12_CR24"},{"issue":"1","key":"12_CR25","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z. Wang","year":"2009","unstructured":"Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? - A new look at signal fidelity measures. IEEE Signal Processing Magazine\u00a026(1), 98\u2013117 (2009)","journal-title":"IEEE Signal Processing Magazine"},{"issue":"4","key":"12_CR26","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing\u00a013(4), 600\u2013612 (2004)","journal-title":"IEEE Transactions on Image Processing"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T01:45:14Z","timestamp":1675129514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}