{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:16:22Z","timestamp":1773512182753,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319633145","type":"print"},{"value":"9783319633152","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63315-2_47","type":"book-chapter","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T08:48:34Z","timestamp":1500540514000},"page":"536-547","source":"Crossref","is-referenced-by-count":104,"title":["Coverless Information Hiding Based on Robust Image Hashing"],"prefix":"10.1007","author":[{"given":"Shuli","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Liang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Baohong","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Donghui","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,21]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles. Algorithms and Applications. Cambridge University Press, Cambridge (2009)"},{"key":"47_CR2","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1049\/ip-vis:20059022","volume":"152","author":"HC Wu","year":"2005","unstructured":"Wu, H.C., Wu, N., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. Proc.-Vis. Image Sig. Process. 152, 611\u2013615 (2005)","journal-title":"Proc.-Vis. Image Sig. Process."},{"issue":"3","key":"47_CR3","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","volume":"3","author":"CH Yang","year":"2008","unstructured":"Yang, C.H., Weng, C.Y., Wang, S.J.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488\u2013497 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"Li, Z., Chen, X., Pan, X., Zheng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: Proceedings of the International Conference on Computer Engineering and Technology, pp. 588\u2013592 (2009)","DOI":"10.1109\/ICCET.2009.40"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Penvny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, vol. 6505, pp. 3\u20134 (2007)","DOI":"10.1117\/12.696774"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Ruanaidh, J.J.K.O., Dowling, W.J., Boland, F.M.: Phase watermarking of digital images. In: International Conference on Image Processing, pp. 239\u2013242 (1996)","DOI":"10.1109\/ICIP.1996.560428"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Practical steganalysis of digital images-state of the art. In: Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, vol. 4675, pp. 1\u201313 (2002)","DOI":"10.1117\/12.465263"},{"issue":"12","key":"47_CR8","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"2010","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (2010)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"47_CR9","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.amc.2006.07.041","volume":"185","author":"WY Chen","year":"2007","unstructured":"Chen, W.Y.: Color image steganography scheme using set partitioning in hierarchical treescoding, digital Fourier transform and adaptive phase modulation. Appl. Math. Comput. 185(1), 432\u2013448 (2007)","journal-title":"Appl. Math. Comput."},{"issue":"5","key":"47_CR10","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1109\/41.954550","volume":"48","author":"MS Hsieh","year":"2001","unstructured":"Hsieh, M.S., Tseng, D.C., Huang, Y.H.: Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans. Industr. Electron. 48(5), 875\u2013882 (2001)","journal-title":"IEEE Trans. Industr. Electron."},{"issue":"5","key":"47_CR11","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TMM.2008.922795","volume":"10","author":"WH Lin","year":"2008","unstructured":"Lin, W.H., Horng, S.J., Kao, T.W.: An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans. Multimedia 10(5), 746\u2013757 (2008)","journal-title":"IEEE Trans. Multimedia"},{"issue":"1","key":"47_CR12","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/TIP.2014.2371246","volume":"24","author":"KC Wu","year":"2015","unstructured":"Wu, K.C., Wang, C.M.: Steganography using reversible texture synthesis. IEEE Trans. Image Proc. 24(1), 130\u2013139 (2015)","journal-title":"IEEE Trans. Image Proc."},{"key":"47_CR13","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1007\/s00371-014-1045-z","volume":"31","author":"J Xu","year":"2015","unstructured":"Xu, J., Mao, X., Jin, X.: Hidden message in a deformation-based texture. Vis. Comput. 31, 1653\u20131669 (2015)","journal-title":"Vis. Comput."},{"key":"47_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-27051-7_12","volume-title":"Cloud Computing and Security","author":"X Chen","year":"2015","unstructured":"Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133\u2013143. Springer, Cham (2015). doi: 10.1007\/978-3-319-27051-7_12"},{"key":"47_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","volume-title":"Cloud Computing and Security","author":"Z Zhou","year":"2015","unstructured":"Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123\u2013132. Springer, Cham (2015). doi: 10.1007\/978-3-319-27051-7_11"},{"issue":"8","key":"47_CR16","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"ZH Xia","year":"2014","unstructured":"Xia, Z.H., Wang, X.H., Sun, X.M., Wang, B.W.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283\u20131291 (2014)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63315-2_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T17:19:49Z","timestamp":1719335989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63315-2_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633145","9783319633152"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63315-2_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}