{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:23:03Z","timestamp":1742912583648,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319393926"},{"type":"electronic","value":"9783319393933"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39393-3_24","type":"book-chapter","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T15:24:36Z","timestamp":1463757876000},"page":"241-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Highly Transparent Steganography Scheme of Speech Signals into Color Images Using Quantization Index Modulation"],"prefix":"10.1007","author":[{"given":"Diego","family":"Renza","sequence":"first","affiliation":[]},{"given":"Dora M.","family":"Ballesteros L.","sequence":"additional","affiliation":[]},{"given":"Jeisson","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,21]]},"reference":[{"issue":"6","key":"24_CR1","first-page":"1156","volume":"6","author":"DM Ballesteros L","year":"2015","unstructured":"Ballesteros L, D.M., Renza, D., Rincon, R.: Gray-scale images within color images using similarity histogram-based selection and replacement algorithm. J. Inf. Hiding Multimed. Sig. Process. 6(6), 1156\u20131166 (2015)","journal-title":"J. Inf. Hiding Multimed. Sig. Process."},{"key":"24_CR2","series-title":"Springer Topics in Signal Processing","first-page":"1","volume-title":"Noise Reduction in Speech Processing","author":"J Benesty","year":"2009","unstructured":"Benesty, J., Chen, J., Huang, Y., Cohen, I.: Pearson correlation coefficient. Noise Reduction in Speech Processing. Springer Topics in Signal Processing, vol. 2, pp. 1\u20134. Springer, Heidelberg (2009)"},{"key":"24_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-13405-0_3","volume-title":"Advanced Communication and Networking","author":"D Bhattacharyya","year":"2010","unstructured":"Bhattacharyya, D., Dutta, P., Balitanas, M.O., Kim, T., Das, P.: Hiding data in audio signal. In: Chang, C.-C., Vasilakos, T., Das, P., Kim, T., Kang, B.-H., Khurram Khan, M. (eds.) ACN 2010. CCIS, vol. 77, pp. 23\u201329. Springer, Heidelberg (2010)"},{"issue":"1\u20132","key":"24_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008107127819","volume":"27","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation methods for digital watermarking and information embedding of multimedia. J. VLSI Signal Process. Syst. Signal Image video Technol. 27(1\u20132), 7\u201333 (2001)","journal-title":"J. VLSI Signal Process. Syst. Signal Image video Technol."},{"issue":"2","key":"24_CR5","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00034-008-9019-x","volume":"27","author":"A Delforouzi","year":"2008","unstructured":"Delforouzi, A., Pooyan, M.: Adaptive digital audio steganography based on integer wavelet transform. Circuits Syst. Signal Process. 27(2), 247\u2013259 (2008)","journal-title":"Circuits Syst. Signal Process."},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.procs.2015.03.207","volume":"47","author":"S Hemalatha","year":"2015","unstructured":"Hemalatha, S., Acharya, U.D., Renuka, A.: Wavelet transform based steganography technique to hide audio signals in image. Procedia Comput. Sci. 47, 272\u2013281 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"NJ Hopper","year":"2002","unstructured":"Hopper, N.J., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77\u201392. Springer, Heidelberg (2002)"},{"issue":"10","key":"24_CR8","first-page":"1","volume":"38","author":"SE Jero","year":"2014","unstructured":"Jero, S.E., Ramu, P., Ramakrishnan, S.: Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J. Med. Syst. 38(10), 1\u201311 (2014)","journal-title":"J. Med. Syst."},{"issue":"8","key":"24_CR9","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1631\/jzus.C1100374","volume":"13","author":"SB Li","year":"2012","unstructured":"Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. SCIENCE C 13(8), 624\u2013634 (2012)","journal-title":"J. Zhejiang Univ. SCIENCE C"},{"issue":"7","key":"24_CR10","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"Mallat, S.G.: A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7), 674\u2013693 (1989)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"24_CR11","series-title":"Advanced Sciences and Technologies for Security Applications","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/0-387-25096-4_6","volume-title":"Optical and Digital Techniques for Information Security","author":"LM Marvel","year":"2005","unstructured":"Marvel, L.M.: Information hiding: steganography and watermarking. In: Javidi, B. (ed.) Optical and Digital Techniques for Information Security. Advanced Sciences and Technologies for Security Applications, pp. 113\u2013133. Springer, New York (2005)"},{"issue":"2","key":"24_CR12","first-page":"163","volume":"25","author":"A Phadikar","year":"2013","unstructured":"Phadikar, A.: Multibit quantization index modulation: A high-rate robust data-hiding method. J. King Saud Univ. Comput. Inf. Sci. 25(2), 163\u2013171 (2013)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"1","key":"24_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-4722-2012-20","volume":"2012","author":"S Rekik","year":"2012","unstructured":"Rekik, S., Guerchi, D., Selouani, S.A., Hamam, H.: Speech steganography using wavelet and fourier transforms. EURASIP J. Audio Speech Music Process. 2012(1), 1\u201314 (2012)","journal-title":"EURASIP J. Audio Speech Music Process."},{"issue":"4","key":"24_CR14","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39393-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T00:04:43Z","timestamp":1589933083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39393-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393926","9783319393933"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39393-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}