{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:22Z","timestamp":1725550882454},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_114","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"617-620","source":"Crossref","is-referenced-by-count":0,"title":["Image Segmentaion and Steganography for Secured Information Transmission"],"prefix":"10.1007","author":[{"given":"Mamta","family":"Juneja","sequence":"first","affiliation":[]},{"given":"Parvinder Singh","family":"Sandhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"114_CR1","first-page":"51","volume-title":"Proceedings of CRYPTO 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The Prisoners\u2019 Problem and the Subliminal Channel. In: Proceedings of CRYPTO 1983, pp. 51\u201367. Plenum Press, New York (1984)"},{"doi-asserted-by":"crossref","unstructured":"Stretching the Limits of Steganography. In: Anderson, R.J. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 39\u201348. Springer, Heidelberg (1996)","key":"114_CR2","DOI":"10.1007\/3-540-61996-8_30"},{"unstructured":"Kahn, D.: The Codebreakers - the comprehensive history of secret communication from ancient times to the Internet, Scribner, New York (1996)","key":"114_CR3"},{"unstructured":"Shi, J., Malik, J.: Normalized Cuts and Image Segmentation. In: Int. Conf. Computer Vision and Pattern Recognition, San Juan, Puerto Rico (June 1997)","key":"114_CR4"},{"key":"114_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-49380-8_25","volume-title":"Information Hiding","author":"S. Craver","year":"1998","unstructured":"Craver, S.: On Public-key Steganography in the Presence of an Active Warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 355\u2013368. Springer, Heidelberg (1998)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_114.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:51:35Z","timestamp":1606186295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_114","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}