{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T21:14:16Z","timestamp":1651871656199},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11042-014-1877-6","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:05:44Z","timestamp":1391187944000},"page":"5661-5682","source":"Crossref","is-referenced-by-count":4,"title":["A novel secure block data-hiding algorithm using cellular automata to enhance the performance of JPEG steganography"],"prefix":"10.1007","volume":"74","author":[{"given":"Tuan Duc","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Somjit","family":"Arch-int","sequence":"additional","affiliation":[]},{"given":"Ngamnij","family":"Arch-int","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,1]]},"reference":[{"key":"1877_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84996-217-9","volume-title":"Game of life cellular automata","author":"A Adamatzky","year":"2010","unstructured":"Adamatzky A (2010) Game of life cellular automata. Springer, London. doi: 10.1007\/978-1-84996-217-9"},{"issue":"4","key":"1877_CR2","first-page":"129","volume":"2","author":"SK Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay SK, Datta B (2011) Higher LSB layer based audio steganography technique. Int J Electron Commun Technol 2(4):129\u2013135","journal-title":"Int J Electron Commun Technol"},{"key":"1877_CR3","unstructured":"Bridge S (2012) Chaos based encryption. codeproject. http:\/\/www.codeproject.com\/Articles\/311809\/Chaos-Based-Encryption"},{"key":"1877_CR4","unstructured":"Brown RG (2004) Dieharder a random number test suite. http:\/\/www.phy.duke.edu\/~rgb\/General\/dieharder.php"},{"issue":"1","key":"1877_CR5","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TIFS.2011.2164907","volume":"7","author":"W Chao","year":"2012","unstructured":"Chao W, Weiming Z, Jiufen L, Nenghai Y (2012) Fast matrix embedding by matrix extending. IEEE Trans Inf Forensic Secur 7(1):346\u2013350. doi: 10.1109\/tifs.2011.2164907","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1877_CR6","doi-asserted-by":"crossref","unstructured":"Chunhua C, Shi YQ JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on, 18\u201321 May 2008. pp 3029\u20133032. doi: 10.1109\/iscas.2008.4542096","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"1877_CR7","unstructured":"Crandall R (1998) Some notes on steganography. http:\/\/www.dia.unisa.it\/~ads\/corso-security\/www\/CORSO-0203\/steganografia\/LINKS%20LOCALI\/matrix-encoding.pdf"},{"issue":"1","key":"1877_CR8","first-page":"56","volume":"11","author":"N Cvejic","year":"2005","unstructured":"Cvejic N, Sepp\u00e4nen T (2005) Increasing robustness of LSB audio steganography by reduced distortion LSB coding. J Univ Comput Sci 11(1):56\u201365. doi: 10.3217\/jucs-011-01-0056","journal-title":"J Univ Comput Sci"},{"issue":"4","key":"1877_CR9","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/TIFS.2012.2198213","volume":"7","author":"H Fangjun","year":"2012","unstructured":"Fangjun H, Jiwu H, Yun-Qing S (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7(4):1181\u20131191. doi: 10.1109\/tifs.2012.2198213","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1877_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Soukal D Perturbed Quantization Steganography with Wet Paper Codes. In: ACM Multimedia and Security Workshop, Magdeburg, Germany, 2004. ACM New York, NY, USA, pp 4\u201315. doi: 10.1145\/1022431.1022435","DOI":"10.1145\/1022431.1022435"},{"key":"1877_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich J, Tom\u00e1s, Pevn\u00fd, Kodovsk\u00fd J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. Paper presented at the Proceedings of the 9th workshop on Multimedia & security, Dallas, Texas, USA","DOI":"10.1145\/1288869.1288872"},{"key":"1877_CR12","doi-asserted-by":"crossref","unstructured":"Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. In: Camenisch J, Collberg C, Johnson N, Sallee P (eds) Information hiding, vol 4437. Lecture notes in computer science. Springer Berlin, Heidelberg, pp 314\u2013327. doi: 10.1007\/978-3-540-74124-4_21","DOI":"10.1007\/978-3-540-74124-4_21"},{"key":"1877_CR13","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd J, Fridrich J (2009) Calibration revisited. Paper presented at the Proceedings of the 11th ACM workshop on Multimedia and security, Princeton, New Jersey, USA","DOI":"10.1145\/1597817.1597830"},{"issue":"2","key":"1877_CR14","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432\u2013444. doi: 10.1109\/tifs.2011.2175919","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"5","key":"1877_CR15","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"GC Langelaar","year":"2000","unstructured":"Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Proc Mag 17(5):20\u201346. doi: 10.1109\/79.879337","journal-title":"IEEE Signal Proc Mag"},{"issue":"2\u20133","key":"1877_CR16","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11042-009-0440-3","volume":"52","author":"W Luo","year":"2011","unstructured":"Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52(2\u20133):407\u2013430. doi: 10.1007\/s11042-009-0440-3","journal-title":"Multimed Tools Appl"},{"key":"1877_CR17","doi-asserted-by":"crossref","unstructured":"Mazurczyk W, Szaga P, Szczypiorski K (2012) Using transcoding for hidden communication in IP telephony. Multimed Tools Appl:1\u201327. doi: 10.1007\/s11042-012-1224-8","DOI":"10.1007\/s11042-012-1224-8"},{"key":"1877_CR18","unstructured":"Never-compressed image database (2011) Sam Houston State University. http:\/\/www.shsu.edu\/~qxl005\/New\/Downloads\/index.html"},{"issue":"2","key":"1877_CR19","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11042-010-0517-z","volume":"54","author":"M Omoomi","year":"2011","unstructured":"Omoomi M, Samavi S, Dumitrescu S (2011) An efficient high payload \u00b11 data embedding scheme. Multimed Tools Appl 54(2):201\u2013218. doi: 10.1007\/s11042-010-0517-z","journal-title":"Multimed Tools Appl"},{"key":"1877_CR20","doi-asserted-by":"crossref","unstructured":"Pevny T, Fridrich J Merging Markov and DCT Features for Multi-Class JPEG Steganalysis. In: Delp EJ, Wong PW (eds) Proceedings SPIE, Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, CA, 2007. pp 301\u2013314","DOI":"10.1117\/12.696774"},{"issue":"4","key":"1877_CR21","first-page":"043009","volume":"22","author":"K Qazanfari","year":"2013","unstructured":"Qazanfari K, Safabakhsh R (2013) High-capacity method for hiding data in the discrete cosine transform domain. ELECTIM 22(4):043009\u2013043009. doi: 10.1117\/1.jei.22.4.043009","journal-title":"ELECTIM"},{"key":"1877_CR22","first-page":"154","volume-title":"Digital watermarking, vol 2939. Lecture notes in computer science","author":"P Sallee","year":"2004","unstructured":"Sallee P (2004) Model-based steganography. In: Kalker T, Cox I, Ro Y (eds) Digital watermarking, vol 2939. Lecture notes in computer science. Springer, Berlin, pp 154\u2013167. doi: 10.1007\/978-3-540-24624-4_12"},{"issue":"2","key":"1877_CR23","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/TIFS.2010.2046218","volume":"5","author":"A Sarkar","year":"2010","unstructured":"Sarkar A, Madhow U, Manjunath BS (2010) Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Trans Inf Forensic Secur 5(2):225\u2013239. doi: 10.1109\/tifs.2010.2046218","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1877_CR24","doi-asserted-by":"crossref","unstructured":"Solanki K, Sarkar A, Manjunath BS (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Paper presented at the Proceedings of the 9th international conference on Information hiding, Saint Malo, France","DOI":"10.1007\/978-3-540-77370-2_2"},{"issue":"2","key":"1877_CR25","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11042-011-0799-9","volume":"66","author":"P-C Su","year":"2013","unstructured":"Su P-C, Lu M-T, Wu C-Y (2013) A practical design of high-volume steganography in digital video files. Multimed Tools Appl 66(2):247\u2013266. doi: 10.1007\/s11042-011-0799-9","journal-title":"Multimed Tools Appl"},{"key":"1877_CR26","doi-asserted-by":"crossref","unstructured":"Westfeld A High capacity despite better steganalysis (F5-A steganographic algorithm). In: Moskowitz IS (ed) 4th International Workshop on Information Hiding, Pittsburgh, USA, 2001. Springer-Verlag, pp 289\u2013302. doi: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.115.3651","DOI":"10.1007\/3-540-45496-9_21"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1877-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-1877-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1877-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T01:49:11Z","timestamp":1565142551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-1877-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,1]]},"references-count":26,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["1877"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-1877-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,1]]}}}