{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:00:57Z","timestamp":1732035657837},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2015,7,2]],"date-time":"2015-07-02T00:00:00Z","timestamp":1435795200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s11042-015-2752-9","type":"journal-article","created":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T04:45:12Z","timestamp":1435725912000},"page":"8319-8345","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["An adaptive multi bit-plane image steganography using block data-hiding"],"prefix":"10.1007","volume":"75","author":[{"given":"Tuan Duc","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Somjit","family":"Arch-int","sequence":"additional","affiliation":[]},{"given":"Ngamnij","family":"Arch-int","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,2]]},"reference":[{"key":"2752_CR1","unstructured":"(1997) SIPI Image Database. http:\/\/sipi.usc.edu\/database\/ . Accessed 24 Jan 2015"},{"key":"2752_CR2","doi-asserted-by":"publisher","first-page":"938515","DOI":"10.1155\/2009\/938515","volume":"2009","author":"F Battisti","year":"2009","unstructured":"Battisti F, Cancellaro M, Boato G et al (2009) Joint watermarking and encryption of color images in the fibonacci-haar domain. EURASIP J Adv Signal Process 2009:938515. doi: 10.1155\/2009\/938515","journal-title":"EURASIP J Adv Signal Process"},{"key":"2752_CR3","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"An information-theoretic model for steganography. inf. hiding","author":"C Cachin","year":"1998","unstructured":"Cachin C (1998) An information-theoretic model for steganography. inf. hiding. Springer, Berlin, pp 306\u2013318"},{"key":"2752_CR4","unstructured":"Chang K-C, Huang PS, Te-Ming Tu, Chien-Ping Chang (2007) Adaptive image steganographic scheme based on Tri-way Pixel-Value Differencing. IEEE, 1165\u20131170"},{"key":"2752_CR5","volume-title":"The design of Rijndael AES - the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael AES - the advanced encryption standard. Springer, Berlin"},{"key":"2752_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. ACM Press, 27","DOI":"10.1145\/1232454.1232466"},{"key":"2752_CR7","doi-asserted-by":"publisher","first-page":"202","DOI":"10.4236\/jis.2012.33025","volume":"03","author":"A Hashemi Pour","year":"2012","unstructured":"Hashemi Pour A (2012) A new steganography method based on the complex pixels. J Inf Secur 03:202\u2013208. doi: 10.4236\/jis.2012.33025","journal-title":"J Inf Secur"},{"key":"2752_CR8","unstructured":"Hirohisa H (2002) A data embedding method using BPCS principle with new complexity measures. Proc Pac. Rim Workshop Digit. Steganography. 30\u201347"},{"key":"2752_CR9","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1016\/j.image.2012.09.002","volume":"27","author":"W Hong","year":"2012","unstructured":"Hong W (2012) Human visual system based data embedding method using quadtree partitioning. Signal Process Image Commun 27:1123\u20131133. doi: 10.1016\/j.image.2012.09.002","journal-title":"Signal Process Image Commun"},{"key":"2752_CR10","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1007\/s11042-012-1293-8","volume":"71","author":"K-H Jung","year":"2014","unstructured":"Jung K-H, Yoo K-Y (2014) Data hiding using edge detector for scalable images. Multimed Tools Appl 71:1455\u20131468. doi: 10.1007\/s11042-012-1293-8","journal-title":"Multimed Tools Appl"},{"key":"2752_CR11","doi-asserted-by":"crossref","unstructured":"Kawaguchi E, Eason RO (1998) Principle and applications of BPCS-steganography","DOI":"10.1117\/12.337436"},{"key":"2752_CR12","doi-asserted-by":"publisher","unstructured":"Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 441\u2013444. doi: 10.1109\/LSP.2005.847889","DOI":"10.1109\/LSP.2005.847889"},{"key":"2752_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forens Secur 7:432\u2013444. doi: 10.1109\/TIFS.2011.2175919","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2752_CR14","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inf Forens Secur 5:201\u2013214. doi: 10.1109\/TIFS.2010.2041812","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2752_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285\u2013287. doi: 10.1109\/LSP.2006.870357","journal-title":"IEEE Signal Process Lett"},{"key":"2752_CR16","unstructured":"Mu\u00f1oz A (2007) StegSecret. A simple steganalysis tool. http:\/\/stegsecret.sourceforge.net\/ . Accessed 24 Jan 2015"},{"key":"2752_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1877-6","author":"TD Nguyen","year":"2014","unstructured":"Nguyen TD, Arch-int S, Arch-int N (2014) A novel secure block data-hiding algorithm using cellular automata to enhance the performance of JPEG steganography. Multimed Tools Appl. doi: 10.1007\/s11042-014-1877-6","journal-title":"Multimed Tools Appl"},{"key":"2752_CR18","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forens Secur 5:215\u2013224. doi: 10.1109\/TIFS.2010.2045842","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2752_CR19","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.sigpro.2007.07.020","volume":"88","author":"H Qi","year":"2008","unstructured":"Qi H, Zheng D, Zhao J (2008) Human visual system based adaptive digital image watermarking. Signal Process 88:174\u2013188. doi: 10.1016\/j.sigpro.2007.07.020","journal-title":"Signal Process"},{"key":"2752_CR20","unstructured":"Rivest RL, Shamir A, Adleman LM (1983) Cryptographic communications system and method. Google Patents"},{"key":"2752_CR21","unstructured":"Rose NJ (2001) Hilbert-type space-filling curves"},{"key":"2752_CR22","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s11042-011-0975-y","volume":"64","author":"V Sabeti","year":"2013","unstructured":"Sabeti V, Samavi S, Shirani S (2013) An adaptive LSB matching steganography based on octonary complexity measure. Multimed Tools Appl 64:777\u2013793. doi: 10.1007\/s11042-011-0975-y","journal-title":"Multimed Tools Appl"},{"key":"2752_CR23","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s11042-012-1078-0","volume":"68","author":"A Sur","year":"2014","unstructured":"Sur A, Ramanathan V, Mukherjee J (2014) Pixel rearrangement based statistical restoration scheme reducing embedding noise. Multimed Tools Appl 68:805\u2013825. doi: 10.1007\/s11042-012-1078-0","journal-title":"Multimed Tools Appl"},{"key":"2752_CR24","unstructured":"Tom\u00e1\u0161 Pevn\u00fd, Tom\u00e1\u0161 Filler, Patrick Bas (2013) Break Our Steganography System. s. Accessed 24 Jan 2015"},{"key":"2752_CR25","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/10719724_16","volume-title":"Inf. Hiding","author":"S Voloshynovskiy","year":"2000","unstructured":"Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T (2000) A Stochastic Approach to Content Adaptive Digital Image Watermarking. In: Pfitzmann A (ed) Inf. Hiding. Springer, Berlin, pp 211\u2013236"},{"key":"2752_CR26","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13:600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"2752_CR27","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Inf. Hiding","author":"A Westfeld","year":"2000","unstructured":"Westfeld A, Pfitzmann A (2000) Attacks on Steganographic Systems. In: Pfitzmann A (ed) Inf. Hiding. Springer, Berlin, pp 61\u201376"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2752-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2752-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2752-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T17:55:38Z","timestamp":1566928538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2752-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,2]]},"references-count":27,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["2752"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2752-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,2]]}}}