{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:55:02Z","timestamp":1764996902296,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_102","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"596-601","source":"Crossref","is-referenced-by-count":19,"title":["Digital Image Steganography Based on Combination of DCT and DWT"],"prefix":"10.1007","author":[{"given":"Vijay","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Dinesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"102_CR1","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2003","unstructured":"Chan, C.K., Chang, L.M.: Hiding data in image by simple LSB substitution. Pattern Recognition\u00a037, 469\u2013471 (2003)","journal-title":"Pattern Recognition"},{"issue":"4","key":"102_CR2","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0030-4018(03)01261-6","volume":"218","author":"A. Sinha","year":"2003","unstructured":"Sinha, A., Singh, K.: A technique for image encryption using digital signature. Optics. Communications\u00a0218(4), 229\u2013234 (2003)","journal-title":"Optics. Communications"},{"key":"102_CR3","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1016\/j.patrec.2004.05.006","volume":"25","author":"C.C. Chang","year":"2004","unstructured":"Chang, C.C., Tseng, H.W.: A Steganographic method for digital images using side match. Pattern Recognition\u00a025, 1431\u20131437 (2004)","journal-title":"Pattern Recognition"},{"key":"102_CR4","unstructured":"Tarres, S., Nakano, M., Perez, H.: An Image Steganography Systems based on BPCS and IWT. In: 16th International Conference on Electronics, Communications and Computers, pp. 51\u201356 (2006)"},{"key":"102_CR5","doi-asserted-by":"crossref","unstructured":"Manikopoulos, C., Yun-Qing, S., Sui, S., Dekun, Z.: Detection of block DCT based stegnography in gray scale images. In: IEEE Workshop on Multimedia Signal Processing, pp. 355\u2013358 (2002)","DOI":"10.1109\/MMSP.2002.1203319"},{"issue":"1","key":"102_CR6","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/TIFS.2006.890310","volume":"2","author":"L. Tsung-Yuan","year":"2007","unstructured":"Tsung-Yuan, L., Wen-Hsiang, T.: A New Steganography method for data hiding in Microsoft Word documents by a Change Tracking Technique. IEEE Transaction on Information Forensics and Security\u00a02(1), 24\u201330 (2007)","journal-title":"IEEE Transaction on Information Forensics and Security"},{"key":"102_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1007\/978-3-540-24624-4_42","volume-title":"Digital Watermarking","author":"E. Kisik Chang","year":"2004","unstructured":"Kisik Chang, E., Chango, J., Sangjin, L.: High Quality Perceptual Steganography Techniques. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 518\u2013531. Springer, Heidelberg (2004)"},{"issue":"2","key":"102_CR8","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TCE.2004.1309431","volume":"50","author":"K. Satish","year":"2004","unstructured":"Satish, K., Jayakar, T., Tobin, C., Madhavi, K., Murali, K.: Chaos based spread spectrum image steganography. IEEE transactions on consumer Electronics\u00a050(2), 587\u2013590 (2004)","journal-title":"IEEE transactions on consumer Electronics"},{"key":"102_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wang, S.Z.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognition, 331\u2013339 (2004)","DOI":"10.1016\/j.patrec.2003.10.014"},{"key":"102_CR10","doi-asserted-by":"crossref","unstructured":"McKeon, R.T.: Steganography Using the Fourier Transform and Zero-Padding Aliasing Properties. In: IEEE International Conference on Electro\/Information Technology, pp. 492\u2013497 (2006)","DOI":"10.1109\/EIT.2006.252135"},{"key":"102_CR11","doi-asserted-by":"crossref","unstructured":"Mastronadri, G., Castellano, M., Marino, F.: Steganography Effects in various Formats of Images-A preliminary study. In: International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 116\u2013119 (2001)","DOI":"10.1109\/IDAACS.2001.941993"},{"key":"102_CR12","doi-asserted-by":"crossref","unstructured":"Abdelwahab, Ahmed, A., Hassan, Lobha, A.: A Discrete Wavelet Transform based Technique for Image Data Hiding. In: National Radio Conference, Egypt, pp. 1\u20139 (2008)","DOI":"10.1109\/NRSC.2008.4542319"},{"key":"102_CR13","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"C.C. Chang","year":"2002","unstructured":"Chang, C.C., Chen, T.S., Chang, L.Z.: A Steganographic method based upon JPEG and Quantization table modification. Information Science\u00a0141, 123\u2013138 (2002)","journal-title":"Information Science"},{"key":"102_CR14","first-page":"247","volume":"8","author":"M.B. Younes","year":"2008","unstructured":"Younes, M.B., Jantan, A.: A New Steganography approach for image encryption exchange by using the Least Significant Bit Insertion. Computer Science and Network Security\u00a08, 247\u2013253 (2008)","journal-title":"Computer Science and Network Security"},{"issue":"6","key":"102_CR15","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P. Tsai","year":"2009","unstructured":"Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing\u00a089(6), 1129\u20131143 (2009)","journal-title":"Signal Processing"},{"issue":"2","key":"102_CR16","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TVCG.2008.94","volume":"15","author":"M.W. Chao","year":"2009","unstructured":"Chao, M.W., Lin, C.H., Yu, C.W., Lee, T.Y.: A high capcity 3D steganography algorithm. IEEE Trnasctions on Visualtion and computer Graphics\u00a015(2), 274\u2013284 (2009)","journal-title":"IEEE Trnasctions on Visualtion and computer Graphics"},{"key":"102_CR17","doi-asserted-by":"crossref","unstructured":"Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: International Conference on Computer Engineering and Technology, pp. 588\u2013592 (2009)","DOI":"10.1109\/ICCET.2009.40"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_102.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T13:42:28Z","timestamp":1740490948000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_102","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}