{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T22:53:41Z","timestamp":1767480821500,"version":"3.40.5"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140537"},{"type":"electronic","value":"9783319140544"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14054-4_10","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T03:39:19Z","timestamp":1418182759000},"page":"151-166","source":"Crossref","is-referenced-by-count":49,"title":["Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping"],"prefix":"10.1007","author":[{"given":"Alan A.","family":"Abdulla","sequence":"first","affiliation":[]},{"given":"Harin","family":"Sellahewa","sequence":"additional","affiliation":[]},{"given":"Sabah A.","family":"Jassim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1007\/s003300101100","volume":"12","author":"P. Mildenberger","year":"2002","unstructured":"Mildenberger, P., Eichelberg, M., Martin, E.: Introduction to the DICOM standard. European Radiology\u00a012, 920\u2013927 (2002)","journal-title":"European Radiology"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Gibaud, B.: The Dicom Standard: A Brief Overview. In: Molecular Imaging: Computer Reconstruction and Practice, pp. 229\u2013238. Springer (2008)","DOI":"10.1007\/978-1-4020-8752-3_13"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C. Chan","year":"2004","unstructured":"Chan, C., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition\u00a037, 469\u2013474 (2004)","journal-title":"Pattern Recognition"},{"key":"10_CR4","first-page":"875","volume":"362","author":"C. Thien","year":"2003","unstructured":"Thien, C., Lin, J.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition\u00a0362, 875 (2003)","journal-title":"Pattern Recognition"},{"key":"10_CR5","unstructured":"Picione, D.D.L., Battisti, F., Carli, M., Astola, J., Egiazarian, K.: A Fibonacci LSB data hiding technique. In: Proc. 14th EUSIPCO (2006)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: Proc. ACM Workshop on Multimedia and Security, pp. 27\u201330 (2001)","DOI":"10.1145\/1232454.1232466"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. Electronic Imaging, International Society for Optics and Photonics, 23\u201334 (2004)","DOI":"10.1117\/12.521350"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Najeena, K.S., Imran, B.M.: An efficient steganographic technique based on chaotic maps and adpative PPM embedding. In: Signal Processing Image Processing & Pattern Recognition (ICSIPR), pp. 293\u2013297. IEEE (2013)","DOI":"10.1109\/ICSIPR.2013.6497943"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Kurtuldu, O., Arica, N.: A new steganography method using image layers. In: ISCIS, pp. 1\u20134. IEEE (2008)","DOI":"10.1109\/ISCIS.2008.4717893"},{"key":"10_CR10","unstructured":"Kraetzer, C.: Visualisation of Benchmarking Results in Digital Watermarking and Steganography. In: ECRYPT, pp. 30\u201346. Citeseer (2007), IST-2002-507932"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-45496-9_2","volume-title":"Information Hiding","author":"T. Sharp","year":"2001","unstructured":"Sharp, T.: An implementation of key-based digital signal steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 13\u201326. Springer, Heidelberg (2001)"},{"issue":"5","key":"10_CR12","first-page":"285","volume":"13","author":"J. Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB matching revisited. LSP IEEE\u00a013(5), 285\u2013287 (2006)","journal-title":"LSP IEEE"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security & Privacy\u00a01, 32\u201344 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"10_CR14","unstructured":"Hempstalk, K.: Hiding behind corners: Using edges in images for better steganography. In: Proceedings of the Computing Women\u2019s Congress, Hamilton, New Zealand, pp. 11\u201319 (2006)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Chen, W.J., Chang, C.C., Le, T.: High payload steganography mechanism using hybrid edge detector \u00a037(4), 3292\u20133301 (2010)","DOI":"10.1016\/j.eswa.2009.09.050"},{"issue":"2","key":"10_CR16","first-page":"201","volume":"5","author":"L. Weiqi","year":"2010","unstructured":"Weiqi, L., Fangjun, H., Huang, J.: Edge Adaptive Image Steganography Based on LSB Matching Revisited. TIFS\u00a05(2), 201\u2013214 (2010)","journal-title":"TIFS"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Yi, L., Xiaolong, L., Bin, Y.: Locating steganographic payload for LSB matching embedding. In: ICME, pp. 1\u20136 (2011)","DOI":"10.1109\/ICME.2011.6011833"},{"key":"10_CR18","unstructured":"Battisti, F., Carli, M., Neri, A., Egiaziarian, K.: A Generalized Fibonacci LSB Data Hiding Technique. In: CODEC, pp. 671\u2013683 (2006)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Patsakis, C., Fountas, E.: Extending Fibonacci LSB data hiding technique to more integer bases. In: ICACTE, vol.\u00a04, pp. 18\u201327 (2010)","DOI":"10.1109\/ICACTE.2010.5579623"},{"key":"10_CR20","first-page":"1","volume":"6982","author":"E. Mammi","year":"2008","unstructured":"Mammi, E., Battisti, F., Carli, M., Neri, A., Egiazarian, K.: A novel spatial data hiding scheme based on generalized Fibonacci sequences. Proc. SPIE\u00a06982, 1\u20137 (2008)","journal-title":"Proc. SPIE"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Abdulla, A.A., Jassim, S., Sellahewa, H.: Efficient high-capacity steganography techniques. Proc. SPIE\u00a08755, 875508-1\u2013875508-11 (2013)","DOI":"10.1117\/12.2018994"},{"key":"10_CR22","unstructured":"http:\/\/sipi.usc.edu\/database\/database.php?volume=misc (last access date was Spetember 15, 2014)"},{"key":"10_CR23","unstructured":"http:\/\/www.microdicom.com\/downloads.html (last access date was September 15, 2014)"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14054-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:15:38Z","timestamp":1747181738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14054-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319140537","9783319140544"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14054-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}