{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T12:10:03Z","timestamp":1748434203007,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319198231"},{"type":"electronic","value":"9783319198248"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19824-8_26","type":"book-chapter","created":{"date-parts":[[2015,6,6]],"date-time":"2015-06-06T09:06:18Z","timestamp":1433581578000},"page":"317-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Neural Network Approach to Image Steganography Techniques"],"prefix":"10.1007","author":[{"given":"Robert","family":"Jaru\u0161ek","sequence":"first","affiliation":[]},{"given":"Eva","family":"Volna","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Kotyrba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,7]]},"reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.A.: Simple unpredictable pseudo-random number generator. SIAM J. Comput. 15(2), 364\u2013383 (1986)","journal-title":"SIAM J. Comput."},{"key":"26_CR2","unstructured":"Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manage. 2(2) (2012)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Holoska, J., Oplatkova, Z., Zelinka, I., Senkerik, R.: Comparison between neural network steganalysis and linear classification method stegdetect. In: 2010 Second International Conference on Computational Intelligence, Modeling and Simulation (CIMSiM), vol. 10, pp. 15\u201320 (2010)","DOI":"10.1109\/CIMSiM.2010.36"},{"key":"26_CR4","unstructured":"Jaru\u0161ek, R., Voln\u00e1, E., Kotyrba, M.: Steganography based on neural networks (a preliminary study). In: Proceedings of the 20th International Conference on Soft Computing, Mendel 2014, Brno, Czech Republic, pp. 223\u2013228 (2014)"},{"key":"26_CR5","unstructured":"Liu, S., Yao, H., Gao, W.: Steganalysis based on wavelet texture analysis and neural network. In: Fifth World Congress on Intelligent Control and Automation, 2004. WCICA 2004, vol. 5, pp. 4066\u20134069 (2004)"},{"key":"26_CR6","unstructured":"Mohammadi, F.G., Abadeh, M.S.: A survey of data mining techniques for steganalysis. Recent Advances in Steganography, pp. 1\u201325 (2012)"},{"issue":"6","key":"26_CR7","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.1016\/j.dsp.2010.02.003","volume":"20","author":"A Nissar","year":"2010","unstructured":"Nissar, A., Mir, A.H.: Classification of steganalysis techniques study. Digit. Signal Process. 20(6), 1758\u20131770 (2010)","journal-title":"Digit. Signal Process."},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1137\/S1064827593247023","volume":"17","author":"JC Schatzman","year":"1996","unstructured":"Schatzman, J.C.: Accuracy of the discrete Fourier transform and the fast Fourier transform. SIAM J. Sci. Comput. 17, 1150\u20131166 (1996). doi:10.1137\/s1064827593247023","journal-title":"SIAM J. Sci. Comput."},{"key":"26_CR9","unstructured":"Seung, S.: Multilayer perceptrons and backpropagation learning. 9.641 Lecture 4. 1\u20136. http:\/\/hebb.mit.edu\/courses\/9.641\/2002\/lectures\/lecture04.pdf (2002)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Shaohui, L., Hongxun, Y., Wen, G.: Neural network based steganalysis in still images. In: Proceedings of the 2003 International Conference on Multimedia and Expo, ICME\u201903, vol. 20, pp. 509\u2013512 (2003)","DOI":"10.1109\/ICME.2003.1221665"},{"key":"26_CR11","unstructured":"Vani, G.B., Prasad, E.V.: Scalable and highly secured image steganography based on Hopfield chaotic neural network and wavelet transforms. Int. J. Comput. Sci. Issues 10(3), 1 (2013)"},{"key":"26_CR12","unstructured":"Starha, P., Martisek, D., Matousek, R.: Numerical methods of object reconstruction using the method of moments. In: Proceedings of 20th International Conference on Soft Computing\u2014Mendel 2014. Mendel series vol. 2014, pp. 241\u2013248, Brno, ISSN: 1803-3814 (2014)"}],"container-title":["Advances in Intelligent Systems and Computing","Mendel 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19824-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T11:45:14Z","timestamp":1748432714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19824-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319198231","9783319198248"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19824-8_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"7 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}