{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:21Z","timestamp":1771661061183,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_56","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"833-850","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Steganographic Method to Data Hiding in RGB Images Using Pixels Redistribution Combining Fractal-Based Coding and DWT"],"prefix":"10.1007","author":[{"given":"Hector","family":"Caballero-Hernandez","sequence":"first","affiliation":[]},{"given":"Vianney","family":"Mu\u00f1oz-Jimenez","sequence":"additional","affiliation":[]},{"given":"Marco A.","family":"Ramos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jvcir.2018.03.009","volume":"53","author":"R Atta","year":"2018","unstructured":"Atta, R., Ghanbari, M.: A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set. J. Vis. Commun. Image R. 53, 42\u201354 (2018)","journal-title":"J. Vis. Commun. Image R."},{"key":"56_CR2","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. In: NIPS, pp. 2069\u20132079 (2017)"},{"key":"56_CR3","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, S., Khan, A., Nandi, A., Dasmalakar, A., Roy, S., Sanyal, A.: Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography. In: World Congress on In Information and Communication Technologies, pp. 207\u2013214 (2011)","DOI":"10.1109\/WICT.2011.6141214"},{"key":"56_CR4","unstructured":"Boehm, B.: StegExpose - A Tool for Detecting LSB Steganography. Cornell University, pp. 1\u201311 (2014)"},{"issue":"1","key":"56_CR5","doi-asserted-by":"publisher","first-page":"301","DOI":"10.4236\/jcc.2018.61029","volume":"6","author":"MH Btoush","year":"2018","unstructured":"Btoush, M.H., Dawahdeh, Z.E.: A complexity analysis and entropy for different data compression algorithms on text files. J. Comput. Commun. 6(1), 301\u2013315 (2018)","journal-title":"J. Comput. Commun."},{"key":"56_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306\u2013318. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/3-540-49380-8_21"},{"key":"56_CR7","first-page":"1","volume":"10","author":"C Di Laura","year":"2016","unstructured":"Di Laura, C., Pajuelo, D., Kemper, G.: A novel steganography technique for SDTV H.264 AVC encoded video. Int. J. Digit. Multimed. Broadcast. 10, 1\u20139 (2016)","journal-title":"Int. J. Digit. Multimed. Broadcast."},{"key":"56_CR8","unstructured":"Dumitrescu, D., Stan, I.-M., Simion, E.: Steganography techniques. IACR Cryptology ePrint Archive 2017, 341 (2017)"},{"issue":"11","key":"56_CR9","doi-asserted-by":"publisher","first-page":"221","DOI":"10.17230\/ingciencia.11.21.11","volume":"21","author":"C Fajardo","year":"2015","unstructured":"Fajardo, C., Reyes, O.M., Ramirez, A.: Seismic data compression using 2D lifting-wavelet algorithms. Ingenierr\u00eda y Ciencia 21(11), 221\u2013238 (2015)","journal-title":"Ingenierr\u00eda y Ciencia"},{"key":"56_CR10","first-page":"1","volume":"5","author":"VD Hardikkumar","year":"2016","unstructured":"Hardikkumar, V.D., Apurva, A.D.: Steganography of messages using Mandelbrot Fractal. VNSGU J. Sci. Technol. 5, 1\u201313 (2016)","journal-title":"VNSGU J. Sci. Technol."},{"key":"56_CR11","unstructured":"Hosseini, M.: A survey of data compression algorithms and their applications. In: Research Gate, Conference Paper, vol. 1, no. 1, pp. 1\u201314 (2012)"},{"key":"56_CR12","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua, Z., Yi, S., Zhou, Y.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144, 134\u2013144 (2018)","journal-title":"Signal Process."},{"issue":"1","key":"56_CR13","first-page":"1328","volume":"76","author":"C Huang","year":"2018","unstructured":"Huang, C., Chen, Y.: Lossless compression algorithm for multi-source sensor data research. Adv. Comput. Sci. Res. (ACSR) 76(1), 1328\u20131335 (2018)","journal-title":"Adv. Comput. Sci. Res. (ACSR)"},{"key":"56_CR14","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.jvcir.2018.12.038","volume":"58","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Lu, W., Yin, X., Liu, W., Yeung, Y.: Binary image steganography based on joint distortion measurement. Elsevier J. Vis. Commun. Image Recogn. 58, 600\u2013605 (2019)","journal-title":"Elsevier J. Vis. Commun. Image Recogn."},{"key":"56_CR15","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"S Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Peticolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking, 1st edn. Artech House, Norwood, MA, USA (2000)","edition":"1"},{"key":"56_CR16","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1049\/iet-ipr.2011.0059","volume":"6","author":"M Khodaei","year":"2012","unstructured":"Khodaei, M., Faez, K.: New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Proc. 6, 677\u2013689 (2012)","journal-title":"IET Image Proc."},{"key":"56_CR17","unstructured":"Lin, T.Y.: Microsoft coco: common objects in context. In: Advances in Neural Information Processing Systems 30, pp. 1\u201315 (2014). arXiv.org"},{"key":"56_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/b97624","volume-title":"Chaos and Fractals: New Frontiers of Science","author":"HO Peitgen","year":"2004","unstructured":"Peitgen, H.O., Hartmut, J., Dietmar, S.: Chaos and Fractals: New Frontiers of Science, 2nd edn. Springer, New York (2004). https:\/\/doi.org\/10.1007\/b97624","edition":"2"},{"key":"56_CR19","first-page":"129","volume":"3","author":"G Prabakaran","year":"2014","unstructured":"Prabakaran, G., Bhavani, R., Sankaran, S.: Dual transform color image steganography method. Int. J. Innov. Res. Scie. Eng. Technol. 3, 129\u2013135 (2014)","journal-title":"Int. J. Innov. Res. Scie. Eng. Technol."},{"key":"56_CR20","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.ins.2014.02.007","volume":"277","author":"K Qazanfari","year":"2014","unstructured":"Qazanfari, K., Safabakhsh, R.: A new steganography method which preserves histogram: generalization of LSB++. Inf. Sci. Elsevier 277, 90\u2013101 (2014)","journal-title":"Inf. Sci. Elsevier"},{"issue":"3","key":"56_CR21","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. (IJCV) 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis. (IJCV)"},{"key":"56_CR22","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. (IJCV) 115, 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis. (IJCV)"},{"key":"56_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-903-9","volume-title":"Handbook of Data Compression","author":"D Salomon","year":"2010","unstructured":"Salomon, D., Motta, G.: Handbook of Data Compression, 1st edn. Springer, New York (2010). https:\/\/doi.org\/10.1007\/978-1-84882-903-9","edition":"1"},{"issue":"2","key":"56_CR24","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.35940\/ijitee.B6133.129219","volume":"9","author":"BS Shashikiran","year":"2019","unstructured":"Shashikiran, B.S., Shaila, K., Venigopal, K.R.: Hybrid domain steganography for multiple images using DWT-LSB method. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 9(2), 1326\u20131334 (2019)","journal-title":"Int. J. Innov. Technol. Explor. Eng. (IJITEE)"},{"issue":"8","key":"56_CR25","first-page":"90","volume":"3","author":"IMAD Suarjaya","year":"2012","unstructured":"Suarjaya, I.M.A.D.: A new algorithm for data compression optimization. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 3(8), 90\u2013101 (2012)","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"key":"56_CR26","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.procs.2016.05.174","volume":"85","author":"G Swain","year":"2016","unstructured":"Swain, G.: A steganographic method combining LSB substitution and PVD in a block. Procedia Comput. Sci. Elsevier 85, 39\u201344 (2016)","journal-title":"Procedia Comput. Sci. Elsevier"},{"key":"56_CR27","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.17485\/ijst\/2014\/v7i9.16","volume":"7","author":"K Thamizhchelvy","year":"2014","unstructured":"Thamizhchelvy, K., Geetha, G.: Data hiding technique with fractal image generation method using chaos theory and watermarking. Indian J. Sci. Technol. 7, 1271\u20131278 (2014)","journal-title":"Indian J. Sci. Technol."},{"key":"56_CR28","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.21917\/ijivp.2016.0173","volume":"6","author":"A Umbarkar","year":"2016","unstructured":"Umbarkar, A., Kamble, P.R., Thakre, A.V.: Comparative study of edge based LSB matching steganography for color images. ICTACT J. Image Video Process. 6, 1185\u20131191 (2016)","journal-title":"ICTACT J. Image Video Process."},{"key":"56_CR29","first-page":"55","volume":"3","author":"A Vaishali","year":"2015","unstructured":"Vaishali, A., Kajal, A.: Increasing data hiding capacity of BPCS steganography using LZW compression technique. Int. J. Adv. Comput. Eng. Netw. 3, 55\u201360 (2015)","journal-title":"Int. J. Adv. Comput. Eng. Netw."},{"issue":"20","key":"56_CR30","first-page":"1","volume":"232","author":"P Wang","year":"2013","unstructured":"Wang, P., Pan, Z., Zhag, M., Lau, R.W.H., Song, H.: The alpha parallelogram predictor: a lossless compression method for motion capture data. Inf. Sci. Elseivier 232(20), 1\u201310 (2013)","journal-title":"Inf. Sci. Elseivier"},{"key":"56_CR31","unstructured":"Wang, Z., Simoncelli, E.P., Bovik, A.: Multi scale structural similarity for image quality assessment. In: Conference Record of the Thirty-Seventh Asilomar Conference on Signal, Systems and Computers, vol. 2, pp. 1\u20135 (2003)"},{"key":"56_CR32","first-page":"78","volume":"64","author":"S Yi","year":"2018","unstructured":"Yi, S., Zhou, Y., Hua, Z.: Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process.: Image Commun. 64, 78\u201388 (2018)","journal-title":"Signal Process.: Image Commun."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:32Z","timestamp":1771658012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_56","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}