{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:09:38Z","timestamp":1725912578026},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319625232"},{"type":"electronic","value":"9783319625249"}],"license":[{"start":{"date-parts":[[2017,10,4]],"date-time":"2017-10-04T00:00:00Z","timestamp":1507075200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-62524-9_38","type":"book-chapter","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T05:08:37Z","timestamp":1507007317000},"page":"517-528","source":"Crossref","is-referenced-by-count":1,"title":["Reliable Metrics for Image LSB Steganography on Mobile Platforms"],"prefix":"10.1007","author":[{"given":"Dominic","family":"Bucerzan","sequence":"first","affiliation":[]},{"given":"Crina","family":"Ra\u0163iu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,4]]},"reference":[{"key":"38_CR1","unstructured":"Appthority enterprise mobile threat report. Appthority Inc, San Francisco, CA 94105 (2015)"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Lup\u015fe, O.S., C\u0103prioru, A., Stoicu-Tivadar, L.: Mobile applications supporting healthy lifestyle. Soft Computing Applications Soft Computing Applications, Volume 356 of the series Advances in Intelligent Systems and Computing pp 241\u2013248, Proceedings of the 6th International Workshop Soft Computing Applications, Volume 1. Springer International Publishing (2015). ISBN:978-3-319-18295-7","DOI":"10.1007\/978-3-319-18296-4_20"},{"key":"38_CR3","volume-title":"It Threat Evolution in Q2 2015","author":"E David","year":"2015","unstructured":"David, E., et al.: It Threat Evolution in Q2 2015, vol. 125212. Kaspersky Lab HQ, Moscow (2015)"},{"key":"38_CR4","unstructured":"Financial cyberthreats in 2014. Kaspersky Lab, Securelist (2015)"},{"key":"38_CR5","unstructured":"McAfee Labs Threats Report. McAfee Labs, Santa Clara, CA 95054 (2015)"},{"key":"38_CR6","unstructured":"Hosmer, C.: Steganography and Smart Phones. Forensicmag. Advantage Business Media \u00a9 Copyright 2016 Advantage Business Media, 2 August 2012. http:\/\/www.forensicmag.com\/articles\/2012\/02\/steganography-and-smart-phones . Accessed 13 Apr 2016"},{"key":"38_CR7","unstructured":"Gartner: Forecast: PCs, ultramobiles and mobile phones, worldwide, 2012\u20132019, 1Q15 Update, Gartner Inc., Egham, UK (2015)"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"St\u0103nescu, D., St\u00e2ngaciu, V., Stratulat, M.: Steganography on new generation of mobile phones with image and video processing abilities. In: Proceedings of IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics (2010)","DOI":"10.1109\/ICCCYB.2010.5491253"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Bucerzan, D., Ra\u0163iu, C., Manolescu, M.J.: SmartSteg: a new android based steganography application. Int. J. Comput. Commun. Control 8(5) (2013). ISSN:1841-9836","DOI":"10.15837\/ijccc.2013.5.642"},{"issue":"5","key":"38_CR10","doi-asserted-by":"crossref","first-page":"623","DOI":"10.15837\/ijccc.2014.5.704","volume":"9","author":"KM Singh","year":"2014","unstructured":"Singh, K.M., Chanu, Y.J., Tuithung, T.: Steganalysis of\u00a0\u00b1\u00a0k steganography based on noncausal linear predictor. Int. J. Comput. Commun. Control 9(5), 623\u2013632 (2014). ISSN:1841-9836","journal-title":"Int. J. Comput. Commun. Control"},{"issue":"5","key":"38_CR11","doi-asserted-by":"crossref","first-page":"678","DOI":"10.15837\/ijccc.2015.5.2029","volume":"10","author":"SH Karamchandani","year":"2015","unstructured":"Karamchandani, S.H., Gandhi, K.J., Gosalia, S.R., Madan, V.K., Merchant, S.N., Desai, U.B.: PCA encrypted short acoustic data inculcated in digital color images. Int. J. Comput. Commun. Control. 10(5), 678\u2013685 (2015). ISSN:1841-9836","journal-title":"Int. J. Comput. Commun. Control."},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones and mitigation technique. IEEE Commun. Surv. Tutor. 17 (2015)","DOI":"10.1109\/COMST.2014.2350994"},{"key":"38_CR13","unstructured":"Bucerzan, D., Ra\u0163iu, C.: Steganography and Cryptography on Mobile Platform. Constan\u0163a Maritime University Annals 14(20) (2013). ISSN:1582 3601"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Bucerzan, D., Ra\u0163iu, C.: Contributions to steganographic techniques on mobile devices. In: Proceedings of the Security for Information Technology and Communications, LNCS, vol. 9522. Springer (2015)","DOI":"10.1007\/978-3-319-27179-8_17"},{"key":"38_CR15","doi-asserted-by":"publisher","unstructured":"Dhall, S., Bhushan, B., Gupta, S.: An in-depth analysis of various steganography techniques. Int. J. Secur. Appl. 9(8) (2015). doi: 10.14257\/ijsia.2015.9.8.07","DOI":"10.14257\/ijsia.2015.9.8.07"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Wang, Z., Bovik, A.C.: A universal image quality index. IEEE Signal Process. Lett. 9(3) (2002)","DOI":"10.1109\/97.995823"},{"key":"38_CR17","unstructured":"Guiffy software. The advanced cross-platform image diff, Copyright \u00a9 2016 Guiffy Software, Inc. All rights reserved. http:\/\/www.guiffy.com\/Image-Diff-Tool.html . Accessed 24 June 2016"},{"key":"38_CR18","unstructured":"Steganography studio. http:\/\/stegstudio.sourceforge.net\/ . Accessed 16 June 2016"},{"key":"38_CR19","unstructured":"Gulame, M., Joshi, K.R., Kamthe, R.S.: A full reference based objective image quality assessment. Int. J. Adv. Electr. Electron. Eng. 2(6) (2013). ISSN (Print):2278\u20138948"},{"key":"38_CR20","unstructured":"Raghavender Rao, Y., Prathapani, N., Nagabhooshanam, E.: Application of normalized cross correlation to image registration. IJRET 3(5). eISSN:2319-1163, pISSN:2321-7308 (2014)"},{"key":"38_CR21","unstructured":"Boja, C., Batagan, L.: Analysis of m-learning applications quality. WSEAS Trans. Comput. 8(5). ISSN:1109-2750, World Scientific and Engineering Academy and Society (WSEAS) (2009)"},{"key":"38_CR22","unstructured":"Boja, C., Doinea, M.: Usability vs. Security in mobile applications. In: Proceedings of the 12th International Conference on INFORMATICS in ECONOMY (IE 2013), Education, Research & Business Technologies, Bucharest, Romania (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62524-9_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T05:29:55Z","timestamp":1570166995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62524-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,4]]},"ISBN":["9783319625232","9783319625249"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62524-9_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,10,4]]}}}