{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:14:57Z","timestamp":1725750897405},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029306"},{"type":"electronic","value":"9783319029313"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-02931-3_31","type":"book-chapter","created":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T10:00:13Z","timestamp":1380967213000},"page":"277-283","source":"Crossref","is-referenced-by-count":0,"title":["Security Analysis of Digital Stegno Images Using Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"G.","family":"Praneeta","sequence":"first","affiliation":[]},{"given":"B.","family":"Pradeep","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"31_CR1","first-page":"137","volume":"1","author":"S. Channalli","year":"2009","unstructured":"Channalli, S., et al.: International Journal on Computer Science and Engineering\u00a01(3), 137\u2013141 (2009)","journal-title":"International Journal on Computer Science and Engineering"},{"issue":"2","key":"31_CR2","first-page":"2249","volume":"2","author":"M.K. Goel","year":"1999","unstructured":"Goel, M.K., Jain, N.: A Novel Visual Cryptographic Steganography Technique. International Journal of Computer, Electronics & Electrical Engineering\u00a02(2) (1999) ISSN: 2249 - 9997","journal-title":"International Journal of Computer, Electronics & Electrical Engineering"},{"key":"31_CR3","unstructured":"Hamid, N., Yahya, A., Badlishah Ahmad, R., Al-Qershi, O.M.: Image Steganography Techniques: An Overview. International Journal of Computer Science and Security (IJCSS)\u00a06(3) (2012)"},{"issue":"3","key":"31_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"3","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security Privacy\u00a03(3), 32\u201344 (2003)","journal-title":"IEEE Security Privacy"},{"issue":"11","key":"31_CR5","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1109\/LSP.2007.903255","volume":"14","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Zhang, X., Wang, S.: A double layered plus-minus one data embedding scheme. IEEE Signal Process. Lett.\u00a014(11), 848\u2013851 (2007)","journal-title":"IEEE Signal Process. Lett."},{"key":"31_CR6","unstructured":"Chao, R.M., Wu, H.C., Lee, C.C., Chu, Y.P.: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Security 2009, Article ID 658047\u00a0(2009), doi:10.1155\/2009"},{"issue":"11","key":"31_CR7","doi-asserted-by":"publisher","first-page":"2954","DOI":"10.1016\/j.sigpro.2010.04.022","volume":"90","author":"J. Wang","year":"2010","unstructured":"Wang, J., Sun, Y., Xu, H., Chen, K., Kim, H.J., Joo, S.H.: An improved section-wise exploiting modification direction method. Signal Process.\u00a090(11), 2954\u20132964 (2010)","journal-title":"Signal Process."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A. Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Process.\u00a090, 727\u2013752 (2010)","journal-title":"Signal Process."},{"issue":"6","key":"31_CR9","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"A.D. Ker","year":"2005","unstructured":"Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett.\u00a012(6), 441\u2013444 (2005)","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"31_CR10","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit.\u00a037(3), 469\u2013474 (2004)","journal-title":"Pattern Recognit."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02931-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T18:54:33Z","timestamp":1558119273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02931-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319029306","9783319029313"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02931-3_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}