{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:58:38Z","timestamp":1725814718597},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319144443"},{"type":"electronic","value":"9783319144450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14445-0_1","type":"book-chapter","created":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T20:05:56Z","timestamp":1419192356000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Hybrid Steganography Method Based on Edge Adaptive and Tree Based Parity Check"],"prefix":"10.1007","author":[{"given":"Hayat","family":"Al-Dmour","sequence":"first","affiliation":[]},{"given":"Noman","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Al-Ani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D.C. Wu","year":"2003","unstructured":"Wu, D.C., Tsai, W.-H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters\u00a024(9), 1613\u20131626 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Verma, N.: Review of steganography techniques. In: Proceedings of the International Conference & Workshop on Emerging Trends in Technology, pp. 990\u2013993. ACM (2011)","DOI":"10.1145\/1980022.1980237"},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11042-006-0008-4","volume":"30","author":"K. Bailey","year":"2006","unstructured":"Bailey, K., Curran, K.: An evaluation of image based steganography methods. Multimedia Tools and Applications\u00a030(1), 55\u201388 (2006)","journal-title":"Multimedia Tools and Applications"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Sok\u00f3\u0142, B., Yarmolik, V.: Cryptography and steganography: teaching experience. In: Enhanced methods in computer security, biometric and artificial intelligence systems, pp. 83\u201392. Springer (2005)","DOI":"10.1007\/0-387-23484-5_8"},{"key":"1_CR5","series-title":"AISC","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-642-35314-7_63","volume-title":"Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA)","author":"R. Mukherjee","year":"2013","unstructured":"Mukherjee, R., Ghoshal, N.: Steganography based visual cryptography (SBVC). In: Satapathy, S.C., Udgata, S.K., Biswal, B.N. (eds.) Proceedings of Int. Conf. on Front. of Intell. Comput. AISC, vol.\u00a0199, pp. 559\u2013566. Springer, Heidelberg (2013)"},{"issue":"3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A. Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: Survey and analysis of current methods. Signal Processing\u00a090(3), 727\u2013752 (2010)","journal-title":"Signal Processing"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Shrivastava, G., Pandey, A., Sharma, K.: Steganography and its technique: Technical overview. In: Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing, pp. 615\u2013620. Springer (2013)","DOI":"10.1007\/978-1-4614-3363-7_74"},{"key":"1_CR8","unstructured":"Johnson, N.F., Jajodia, S.: Exploring steganography: Seeing the unseen"},{"issue":"2","key":"1_CR9","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W. Luo","year":"2010","unstructured":"Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on Information Forensics and Security\u00a05(2), 201\u2013214 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: On estimation of secret message length in lsb steganography in spatial domain. In: Electronic Imaging 2004, pp. 23\u201334. International Society for Optics and Photonics (2004)","DOI":"10.1117\/12.521350"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-36373-3_3","volume-title":"Information Hiding","author":"J. Fridrich","year":"2013","unstructured":"Fridrich, J., Kodovsk\u00fd, J.: Steganalysis of LSB replacement using parity-aware features. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol.\u00a07692, pp. 31\u201345. Springer, Heidelberg (2013)"},{"issue":"2-3","key":"1_CR12","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11042-009-0440-3","volume":"52","author":"W. Luo","year":"2011","unstructured":"Luo, W., Huang, F., Huang, J.: A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools and Applications\u00a052(2-3), 407\u2013430 (2011)","journal-title":"Multimedia Tools and Applications"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Agrawal, S.S., Samant, R.M.: Data hiding in gray-scale images using pixel value differencing. In: Technology Systems and Management, pp. 27\u201333. Springer (2011)","DOI":"10.1007\/978-3-642-20209-4_4"},{"key":"1_CR14","unstructured":"Crandall, R.: Some notes on steganography. Posted on steganography mailing list (1998)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Soukal, D.: Matrix embedding for large payloads. In: Electronic Imaging 2006, pp. 60721W\u201360721W. International Society for Optics and Photonics (2006)","DOI":"10.1117\/12.639933"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Li, R.Y., Au, O.C., Lai, K.K., Yuk, C.K., Lam, S.Y.: Data hiding with tree based parity check. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 635\u2013638. IEEE (2007)","DOI":"10.1109\/ICME.2007.4284730"},{"issue":"3","key":"1_CR17","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIP.2010.2072513","volume":"20","author":"C.L. Hou","year":"2011","unstructured":"Hou, C.L., Lu, C., Tsai, S.C., Tzeng, W.G.: An optimal data hiding scheme with tree-based parity check. IEEE Transactions on Image Processing\u00a020(3), 880\u2013886 (2011)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00530-013-0313-5","volume":"20","author":"G. Liu","year":"2014","unstructured":"Liu, G., Liu, W., Dai, Y., Lian, S.: Adaptive steganography based on block complexity and matrix embedding. Multimedia Systems\u00a020(2), 227\u2013238 (2014)","journal-title":"Multimedia Systems"}],"container-title":["Lecture Notes in Computer Science","MultiMedia Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14445-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T22:00:05Z","timestamp":1559080805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14445-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319144443","9783319144450"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14445-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}