{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:03:51Z","timestamp":1742925831437,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031355066"},{"type":"electronic","value":"9783031355073"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35507-3_7","type":"book-chapter","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:04:13Z","timestamp":1685739853000},"page":"63-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hybrid Image Steganography Method Based on Spectral and Spatial Domain with High Hiding Ratio"],"prefix":"10.1007","author":[{"given":"D.","family":"Kumar","sequence":"first","affiliation":[]},{"given":"V. K.","family":"Sudha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ranjithkumar, R., Ganeshkumar, D., Senthamilarasu, S.: Efficient and secure data hiding in video sequence with three-layer security: an approach using chaos.\u00a0Multimed Tools Appl., 80, 13865\u201313878 (2021)","DOI":"10.1007\/s11042-020-10324-7"},{"issue":"11","key":"7_CR2","doi-asserted-by":"publisher","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2016","unstructured":"Saidi, M., Hermassi, H., Rhouma, R., Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 76(11), 13493\u201313510 (2016). https:\/\/doi.org\/10.1007\/s11042-016-3722-6","journal-title":"Multimedia Tools Appl."},{"issue":"4\u20136","key":"7_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1080\/19393555.2016.1248582","volume":"25","author":"R Ranjith Kumar","year":"2016","unstructured":"Ranjith Kumar, R., Jayasudha, S., Pradeep, S.: Efficient and secure data hiding in encrypted images: a new approach using chaos. Inf. Secur. J. Glob. Perspect. 25(4\u20136), 235\u2013246 (2016). https:\/\/doi.org\/10.1080\/19393555.2016.1248582","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Patel, R., Lad, K., Patel, M.: Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis. Int. J. Inf. Technol. 14, 1649\u20131657 (2022). https:\/\/doi.org\/10.1007\/s41870-021-00788-7","DOI":"10.1007\/s41870-021-00788-7"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Kaur, R., Singh, B.: A hybrid algorithm for robust image steganography. Multidimens. Syst. Signal Process. (2020). https:\/\/doi.org\/10.1007\/s11045-020-00725-0","DOI":"10.1007\/s11045-020-00725-0"},{"issue":"6","key":"7_CR6","doi-asserted-by":"publisher","first-page":"7849","DOI":"10.1007\/s11042-016-3398-y","volume":"76","author":"A Sharif","year":"2016","unstructured":"Sharif, A., Mollaeefar, M., Nazari, M.: A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimedia Tools Appl. 76(6), 7849\u20137867 (2016). https:\/\/doi.org\/10.1007\/s11042-016-3398-y","journal-title":"Multimedia Tools Appl."},{"issue":"8","key":"7_CR7","doi-asserted-by":"publisher","first-page":"9971","DOI":"10.1007\/s11042-018-6584-2","volume":"78","author":"MY Valandar","year":"2018","unstructured":"Valandar, M.Y., Barani, M.J., Ayubi, P., Aghazadeh, M.: An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools Appl. 78(8), 9971\u20139989 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6584-2","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11045-015-0358-z","volume":"28","author":"SA Parah","year":"2015","unstructured":"Parah, S.A., Sheikh, J.A., Assad, U.I., Bhat, G.M.: Hiding in encrypted images: a three tier security data hiding technique. Multidimension. Syst. Signal Process. 28(2), 549\u2013572 (2015). https:\/\/doi.org\/10.1007\/s11045-015-0358-z","journal-title":"Multidimension. Syst. Signal Process."},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Gajabe, R., Ali, S.T.: Secret key-based image steganography in spatial domain Int. J. Image Graph. 22(02). https:\/\/doi.org\/10.1142\/S0219467822500140","DOI":"10.1142\/S0219467822500140"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Thiyagarajan, P., Natarajan, V., Aghila, G.,\u00a0et al.:\u00a0Pattern based 3D image Steganography.\u00a03D Res. 4,\u00a01 (2013). https:\/\/doi.org\/10.1007\/3DRes.01(2013)1","DOI":"10.1007\/3DRes.01(2013)1"},{"issue":"6","key":"7_CR11","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.1007\/s10773-018-3710-x","volume":"57","author":"R-G Zhou","year":"2018","unstructured":"Zhou, R.-G., Luo, J., Liu, X., Zhu, C., Wei, L., Zhang, X.: A novel quantum image steganography scheme based on LSB. Int. J. Theor. Phys. 57(6), 1848\u20131863 (2018). https:\/\/doi.org\/10.1007\/s10773-018-3710-x","journal-title":"Int. J. Theor. Phys."},{"issue":"11","key":"7_CR12","doi-asserted-by":"publisher","first-page":"13133","DOI":"10.1007\/s11042-017-4935-z","volume":"77","author":"A Miri","year":"2017","unstructured":"Miri, A., Faez, K.: An image steganography method based on integer wavelet transform. Multimedia Tools Appl. 77(11), 13133\u201313144 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4935-z","journal-title":"Multimedia Tools Appl."},{"issue":"15","key":"7_CR13","doi-asserted-by":"publisher","first-page":"23393","DOI":"10.1007\/s11042-020-10224-w","volume":"80","author":"A AbdelRaouf","year":"2021","unstructured":"AbdelRaouf, A.: A new data hiding approach for image steganography based on visual color sensitivity. Multimedia Tools Appl. 80(15), 23393\u201323417 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10224-w","journal-title":"Multimedia Tools Appl."},{"issue":"13","key":"7_CR14","doi-asserted-by":"publisher","first-page":"20381","DOI":"10.1007\/s11042-021-10652-2","volume":"80","author":"M Hussain","year":"2021","unstructured":"Hussain, M., Riaz, Q., Saleem, S., Ghafoor, A., Jung, K.-H.: Enhanced adaptive data hiding method using LSB and pixel value differencing. Multimedia Tools Appl. 80(13), 20381\u201320401 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10652-2","journal-title":"Multimedia Tools Appl."},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"1966","DOI":"10.1016\/j.asej.2017.02.003","volume":"9","author":"AA Attaby","year":"2018","unstructured":"Attaby, A.A., Ahmed, M.F.M.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to Steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. 9, 1966\u20131974 (2018). https:\/\/doi.org\/10.1016\/j.asej.2017.02.003","journal-title":"Ain Shams Eng. J."},{"key":"7_CR16","doi-asserted-by":"publisher","DOI":"10.1142\/s0219467821500157","author":"TJ Siddiqui","year":"2020","unstructured":"Siddiqui, T.J., Khare, A.: Chaos-based video steganography method in discrete cosine transform domain. Int. J. Image Graph. (2020). https:\/\/doi.org\/10.1142\/s0219467821500157","journal-title":"Int. J. Image Graph."},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Alipour, M.C., Gerardo, B.D., Medina, R.P.:\u00a0LSB substitution image steganography based on randomized pixel selection and one-time pad encryption. In: 2020 2nd International Conference on Big-Data Service and Intelligent Computation (2020). https:\/\/doi.org\/10.1145\/3440054.3440055","DOI":"10.1145\/3440054.3440055"},{"key":"7_CR18","unstructured":"The USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database. Accessed 12 June 2017"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35507-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:25:11Z","timestamp":1685741111000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35507-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031355066","9783031355073"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35507-3_7","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda22\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}