{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:46Z","timestamp":1725550006058},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240754"},{"type":"electronic","value":"9783540305552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30555-2_53","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:35:49Z","timestamp":1268400949000},"page":"458-467","source":"Crossref","is-referenced-by-count":1,"title":["NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images"],"prefix":"10.1007","author":[{"given":"S. N.","family":"Sivanandam","sequence":"first","affiliation":[]},{"given":"C. K.","family":"Gokulnath","sequence":"additional","affiliation":[]},{"given":"K.","family":"Prasanna","sequence":"additional","affiliation":[]},{"given":"S.","family":"Rajeev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","doi-asserted-by":"crossref","unstructured":"Wang, Y., Moulin, P.: Steganalysis of Block-Structured Stegotext. In: Proc. SPIE Conf., San Jose, CA, January 2004, vol.\u00a05306 (2004)","DOI":"10.1117\/12.527745"},{"key":"53_CR2","doi-asserted-by":"crossref","unstructured":"Cannons, J.L., Moulin, P.: Design and Statistical Analysis of a Hash-Aided Image Wa-termarking System. In: IEEE Trans. on Image Processing (2004) (to appear)","DOI":"10.1109\/TIP.2004.834660"},{"issue":"3","key":"53_CR3","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TIT.2002.808134","volume":"49","author":"P. Moulin","year":"2003","unstructured":"Moulin, P., O\u2019Sullivan, J.A.: Information-Theoretic Analysis of Information Hiding September 1999 (September 1999 postscript); revised (September 2002); IEEE Trans. on Information Theory\u00a049(3), 563\u2013593 (2003)","journal-title":"IEEE Trans. on Information Theory"},{"key":"53_CR4","unstructured":"Moulin, P.: A Mathematical Approach to Watermarking and Data Hiding. In: ICASSP Tutorial, Orlando, FL, May 13 (2002)"},{"key":"53_CR5","unstructured":"Moulin, Delp, E.J.: A Mathematical Approach to Watermarking and Data Hiding. In: ICIP Tutorial, Thessaloniki, Greece, October 7 (2001)"},{"key":"53_CR6","unstructured":"O\u2019Sullivan, J.A., Moulin, P.: Some Properties of Optimal Information Hiding and Information Attacks. In: Proc. 39th Allerton conference, Monticello, IL, October 3\u20135 (2001)"},{"key":"53_CR7","doi-asserted-by":"crossref","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis: The investigation of hidden information. In: Proceedings of the 1998 ieee information technology conference, Syracuse, New York, USA, September 1 - 3 (1998)","DOI":"10.1109\/IT.1998.713394"},{"key":"53_CR8","doi-asserted-by":"crossref","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Proceedings of information hiding workshop, Portland, Oregon, USA (April 1998)","DOI":"10.1007\/3-540-49380-8_19"},{"key":"53_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"F.A.P. Petitcolas","year":"1998","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 219\u2013239. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30555-2_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:59Z","timestamp":1605759719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30555-2_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240754","9783540305552"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30555-2_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}