{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T23:41:54Z","timestamp":1741131714582,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642209970"},{"type":"electronic","value":"9783642209987"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20998-7_39","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T11:33:10Z","timestamp":1302262390000},"page":"315-323","source":"Crossref","is-referenced-by-count":10,"title":["Image Data Hiding Technique Using Discrete Fourier Transformation"],"prefix":"10.1007","author":[{"given":"Debnath","family":"Bhattacharyya","sequence":"first","affiliation":[]},{"given":"Tai-hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"EL-Eman, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Sciences, 223\u2013232 (April 2007)","DOI":"10.3844\/jcssp.2007.223.232"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Amin, P.K., Liu, N., Subbalakshmi, K.P.: Statistically Secure Digital Image Data Hiding. In: IEEE 7th Workshop Multimedia Signal Processing, Shanghai, October 2005, pp. 1\u20134 (2005)","DOI":"10.1109\/MMSP.2005.248648"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: International Conference on Image Processing, Thessaloniki, Greece, pp. 1019\u20131022 (2001)","DOI":"10.1109\/ICIP.2001.958299"},{"issue":"7","key":"39_CR4","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing\u00a051(7), 1995\u20132007 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. on Information Theory\u00a047, 1423\u20131443 (2001)","journal-title":"IEEE Trans. on Information Theory"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Moulin, P., O\u2019Sullivan, J.A.: Information-theoretic analysis of information hiding. In: IEEE International Symposium on Information Theory, Sorrento, Italy, p. 19 (June 2000)","DOI":"10.1109\/ISIT.2000.866309"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1109\/TIP.2002.802512","volume":"11","author":"P. Moulin","year":"2002","unstructured":"Moulin, P., K\u0131vanc M\u0131hcak, M.: A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Trans. on Image Processing\u00a011, 1029\u20131042 (2002)","journal-title":"IEEE Trans. on Image Processing"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Lin, C.-Y., Chang, S.-F.: A robust image authentication method surviving JPEG lossy compression. In: SPIE, pp. 296\u2013307 (1998)","DOI":"10.1117\/12.298462"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Pavan, S., Sridhar, G., Sridhar, V.: Multivariate entropy detector based hybrid image registration. In: IEEE ICASSP 2005, March 18-23, vol.\u00a02, pp. ii\/873\u2013ii\/876 (2005)","DOI":"10.1109\/ICASSP.2005.1415544"},{"issue":"6","key":"39_CR10","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TKDE.2004.15","volume":"16","author":"H.H. Pang","year":"2004","unstructured":"Pang, H.H., Tan, K.L., Zhou, X.: Steganographic schemes for file system and B-tree. IEEE Transaction on Knowledge and Data Engineering\u00a016(6), 701\u2013713 (2004)","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"39_CR11","unstructured":"http:\/\/digitalforensics.Champlain.Edu\/downloads\/s-tools4.zip"}],"container-title":["Communications in Computer and Information Science","Ubiquitous Computing and Multimedia Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20998-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T23:22:10Z","timestamp":1741130530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20998-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642209970","9783642209987"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20998-7_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}