{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:23Z","timestamp":1740098963939,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319698342"},{"type":"electronic","value":"9783319698359"}],"license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-69835-9_28","type":"book-chapter","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T03:37:35Z","timestamp":1509593855000},"page":"296-300","source":"Crossref","is-referenced-by-count":1,"title":["Embedding Strategies in Multi-secret Steganography"],"prefix":"10.1007","author":[{"given":"Katarzyna","family":"Koptyra","sequence":"first","affiliation":[]},{"given":"Marek R.","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","first-page":"3331","DOI":"10.1007\/s00500-015-1728-z","volume":"19","author":"MR Ogiela","year":"2015","unstructured":"Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft. Comput. 19, 3331\u20133339 (2015)","journal-title":"Soft. Comput."},{"key":"28_CR2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) Information Hiding, vol. 1768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5\u2014a steganographic algorithm: high capacity despite better steganalysis. In: 4th International Workshop on Information Hiding, pp. 289\u2013302. Springer (2001)","DOI":"10.1007\/3-540-45496-9_21"},{"key":"28_CR4","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th Conference on USENIX Security Symposium, Berkeley, CA, USA, vol. 10, p. 24 (2001)"},{"key":"28_CR5","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1016\/j.jss.2006.07.006","volume":"80","author":"A Castiglione","year":"2007","unstructured":"Castiglione, A., Santis, A.D., Soriente, C.: Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J. Syst. Softw. 80, 750\u2013764 (2007)","journal-title":"J. Syst. Softw."},{"key":"28_CR6","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.ins.2014.02.007","volume":"277","author":"K Qazanfari","year":"2014","unstructured":"Qazanfari, K., Reza, S.: A new steganography method which preserves histogram: generalization of LSB++. Inf. Sci. 277, 90\u2013101 (2014)","journal-title":"Inf. Sci."},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Nair, A.S., Kumar, A., Sur, A., Nandi, S.: Length based network steganography using UDP protocol. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 726\u2013730 (2011)","DOI":"10.1109\/ICCSN.2011.6014994"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Abdullaziz, O.I., Goh, V.T., Ling, H.C., Wong, K.: Network packet payload parity based steganography. In: IEEE Conference on Sustainable Utilization and Development in Engineering and Technology, pp. 56\u201359 (2013)","DOI":"10.1109\/CSUDET.2013.6670985"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Furuta, T., Noda, H., Niimi, M., Kawaguchi, E.: Bit-plane decomposition steganography using wavelet compressed video. In: Fourth International Conference on Information, Communications and Signal Processing and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint, vol. 2, pp. 970\u2013974 (2003)","DOI":"10.1109\/ICICS.2003.1292602"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Castiglione, A., D\u2019Alessio, B., De Santis, A., Palmieri, F.: New steganographic techniques for the OOXML file format. In: Proceedings of the IFIP WG 8.4\/8.9 International Cross Domain Conference on Availability, Reliability and Security for Business, Enterprise and Health Information Systems, Berlin, Heidelberg, pp. 344\u2013358 (2011)","DOI":"10.1007\/978-3-642-23300-5_27"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Savateev, E.O.: Design of the steganography system based on the version 4 Internet protocol. In: Siberian Conference on Control and Communications, pp. 38\u201351 (2005)","DOI":"10.1109\/SIBCON.2005.1611190"},{"key":"28_CR12","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/11558859_19","volume-title":"Information Hiding","author":"SJ Murdoch","year":"2005","unstructured":"Murdoch, S.J., Lewis, S.: Embedding covert channels into TCP\/IP. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) Information Hiding, vol. 3727, pp. 247\u2013261. Springer, Heidelberg (2005)"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Koptyra, K.: Visual pattern embedding in multi-secret image steganography. In: ICIIBMS 2015 International Conference on Intelligent Informatics and BioMedical Sciences, Okinawa, Japan, 28\u201330 November 2015, pp. 434\u2013437 (2015)","DOI":"10.1109\/ICIIBMS.2015.7439476"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Koptyra, K., Ogiela, M.R.: Key generation for multi-secret steganography. In: ICISS 2015 2nd International Conference on Information Science and Security, Seoul, South Korea, 14\u201316 December 2015, pp. 1\u20134 (2015)","DOI":"10.1109\/ICISSEC.2015.7371013"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69835-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T09:21:16Z","timestamp":1570267276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69835-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"ISBN":["9783319698342","9783319698359"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69835-9_28","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,11,3]]}}}