{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:13:05Z","timestamp":1767625985774},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642215148"},{"type":"electronic","value":"9783642215155"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21515-5_25","type":"book-chapter","created":{"date-parts":[[2011,5,30]],"date-time":"2011-05-30T11:33:45Z","timestamp":1306755225000},"page":"212-220","source":"Crossref","is-referenced-by-count":3,"title":["Using PSO Algorithm for Simple LSB Substitution Based Steganography Scheme in DCT Transformation Domain"],"prefix":"10.1007","author":[{"given":"Feno Heriniaina","family":"Rabevohitra","sequence":"first","affiliation":[]},{"given":"Jun","family":"Sang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3-4","key":"25_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035(3-4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"3099","DOI":"10.1016\/j.ins.2007.02.008","volume":"177","author":"X. Li","year":"2007","unstructured":"Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences\u00a0177, 3099\u20133109 (2007)","journal-title":"Information Sciences"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, D., Dutta, J., Das, P., Banyopadhyay, S.K., Kim, T.-h.: Discrete cosine Transformation based image authentication and secret message transmission scheme. In: First International Conference on Computational Intelligence, Communication Systems and Networks (2009)","DOI":"10.1109\/CICSYN.2009.11"},{"key":"25_CR4","unstructured":"Blondin, J.: Particle Swarm Optimization: A tutorial (September 4, 2009)"},{"key":"25_CR5","volume-title":"Swarm Intelligence","author":"Kennedy","year":"2001","unstructured":"Kennedy, Eberhart, R.C.: Swarm Intelligence. Morgan Kaufmann Publishers, San Francisco (2001) ISBN: 1-55860-595-9"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"C.C.. Chang","year":"2002","unstructured":"Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Information Science\u00a0141, 123\u2013138 (2002)","journal-title":"Information Science"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Parsopoulos, K.E., Vrahatis, M.N.: Particle Swarm Optimization and Intelligence: Advance and Applications. Information Science (2010)","DOI":"10.4018\/978-1-61520-666-7"},{"key":"25_CR8","unstructured":"Fazli, S., Kiamini, M.: A High Performance Steganographic Method Using Jpeg and PSO Algorithm. In: IEEE International Multitopic (December 24, 2008)"},{"key":"25_CR9","volume-title":"Steganography in Digital Media Principles, Algorithm, and Applications","author":"J. Fridrich","year":"2010","unstructured":"Fridrich, J.: Steganography in Digital Media Principles, Algorithm, and Applications. Cambridge University press, Cambridge (2010)"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21515-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T05:09:32Z","timestamp":1560229772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21515-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215148","9783642215155"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21515-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}