{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:27:00Z","timestamp":1767626820692,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319081557"},{"type":"electronic","value":"9783319081564"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08156-4_27","type":"book-chapter","created":{"date-parts":[[2014,6,13]],"date-time":"2014-06-13T15:07:31Z","timestamp":1402672051000},"page":"271-280","source":"Crossref","is-referenced-by-count":5,"title":["A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO)"],"prefix":"10.1007","author":[{"given":"Debiprasad","family":"Bandyopadhyay","sequence":"first","affiliation":[]},{"given":"Kousik","family":"Dasgupta","sequence":"additional","affiliation":[]},{"given":"J. K.","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"Paramartha","family":"Dutta","sequence":"additional","affiliation":[]},{"given":"Varun Kumar","family":"Ojha","sequence":"additional","affiliation":[]},{"given":"V\u00e1clav","family":"Sn\u00e1\u0161el","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"27_CR1","first-page":"1","volume":"2","author":"P.R. Rudramath","year":"2012","unstructured":"Rudramath, P.R., Madki, M.R.: High Capacity Data Embedding Technique using Improved BPCS Steganography. International Journal of Scientific and Research Publications\u00a02(7), 1\u20134 (2012)","journal-title":"International Journal of Scientific and Research Publications"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-35130-3_10","volume-title":"Information Systems Security","author":"G. Paul","year":"2012","unstructured":"Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless Steganography in Spatial Domain Using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol.\u00a07671, pp. 134\u2013148. Springer, Heidelberg (2012)"},{"unstructured":"Gleick, J.: CHAOS, The Amazing Science of the Unpredictable. Vintage Books (1998)","key":"27_CR3"},{"unstructured":"Ganesan, K., Venkatalakshmi, B., Moothy, R.K.: Steganography Using Enhanced Chaotic Encryption Technique. In: International Conference of Communication Systems (2004)","key":"27_CR4"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.cam.2006.09.008","volume":"206","author":"M.S. Tavazoi","year":"2007","unstructured":"Tavazoi, M.S., Haeri, M.: An optimization algorithm based on chaotic behavior and fractul nature. Journal of Computational and Applied Mathematics\u00a0206, 1070\u20131081 (2007)","journal-title":"Journal of Computational and Applied Mathematics"},{"unstructured":"Alirezaanejad, M., Enayatifar, R.: Steganography by using logistic map function and cellular automata. Research Journal of Applied Sciences, Engineering and Technology, 4991\u20134995 (2012)","key":"27_CR6"},{"key":"27_CR7","first-page":"1","volume":"2010","author":"L. Yu","year":"2010","unstructured":"Yu, L., Zhao, Y., Ni, R., Li, T.: Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm. EURASIP Journal on Advances in Signal Processing\u00a02010, 1\u20136 (2010)","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"unstructured":"Das, N.G.: Statistical Methods, 1st edn. Tata-McGraw-Hill Education (2008)","key":"27_CR8"},{"issue":"2","key":"27_CR9","first-page":"1","volume":"1","author":"K. Dasgupta","year":"2012","unstructured":"Dasgupta, K., Mandal, J.K., Dutta, P.: Hash Based Least Significant Bit Technique For Video Steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM)\u00a01(2), 1\u201311 (2012)","journal-title":"International Journal of Security, Privacy and Trust Management (IJSPTM)"},{"key":"27_CR10","first-page":"1","volume":"2013","author":"K. Dasgupta","year":"2013","unstructured":"Dasgupta, K., Mandal, J.K., Dutta, P.: Optimized Video Steganography using Genetic Algorithm (GA). Procedia Computer Science\u00a02013, 1\u20138 (2013)","journal-title":"Procedia Computer Science"},{"unstructured":"Kutter, M., Petitcolas, F.A.P.: A Fair Benchmark For Image Watermarking Systems. In: Electronic Imaging 1999. Security and Watermarking of Multimedia Contents, The International Society for Optical Engineering, vol.\u00a03657, pp. 1\u201314 (1999)","key":"27_CR11"},{"issue":"1","key":"27_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.5121\/ijsptm.2014.3102","volume":"3","author":"D. Bandyopadhyay","year":"2014","unstructured":"Bandyopadhyay, D., Dasgupta, K., Mandal, J.K., Dutta, P.: A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain. International Journal of Security, Privacy and Trust Management (IJSPTM)\u00a03(1), 11\u201322 (2014)","journal-title":"International Journal of Security, Privacy and Trust Management (IJSPTM)"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfield","year":"2000","unstructured":"Westfield, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"unstructured":"StirMark Benchmark, \n                    http:\/\/www.petitcolas.net\/fabien\/watermarking\/stirmark","key":"27_CR14"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08156-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:39:18Z","timestamp":1676867958000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08156-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319081557","9783319081564"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08156-4_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}