{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:13Z","timestamp":1740099073479,"version":"3.37.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319935539"},{"type":"electronic","value":"9783319935546"}],"license":[{"start":{"date-parts":[[2018,6,8]],"date-time":"2018-06-08T00:00:00Z","timestamp":1528416000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-93554-6_53","type":"book-chapter","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T10:15:20Z","timestamp":1528366520000},"page":"546-553","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic"],"prefix":"10.1007","author":[{"given":"Kyungroul","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sun-Young","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kyunghwa","family":"Do","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,8]]},"reference":[{"key":"53_CR1","unstructured":"Wikipedia: Steganography. \nhttps:\/\/en.wikipedia.org\/wiki\/Steganography"},{"key":"53_CR2","doi-asserted-by":"publisher","first-page":"421","DOI":"10.18178\/ijfcc.2015.4.6.429","volume":"4","author":"JD Dodson","year":"2015","unstructured":"Dodson, J.D., Siraj, A.: Applying fuzzy hashing to steganography. J. Future Comput. Commun. 4, 421\u2013425 (2015)","journal-title":"J. Future Comput. Commun."},{"key":"53_CR3","unstructured":"Beh, D., Yin, M.: Data hiding for image using sequential colour cycle algorithm. Ph. D. Thesis. University Malaya (2010)"},{"key":"53_CR4","unstructured":"Wikipedia: Steganography tools. \nhttps:\/\/en.wikipedia.org\/wiki\/Steganography_tools"},{"key":"53_CR5","unstructured":"Ramesh, S.: Hide data in image, audio and video files: steganography. \nhttps:\/\/www.gohacking.com\/hide-data-in-image-audio-video-files-steganography"},{"key":"53_CR6","unstructured":"Wikipedia: JPEG. \nhttps:\/\/en.wikipedia.org\/wiki\/JPEG"},{"key":"53_CR7","unstructured":"Wikipedia: JPEF File Interchange Format. \nhttps:\/\/en.wikipedia.org\/wiki\/JPEG_File_Interchange_Format"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93554-6_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T10:39:04Z","timestamp":1528367944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93554-6_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,8]]},"ISBN":["9783319935539","9783319935546"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93554-6_53","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,6,8]]}}}