{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:53:09Z","timestamp":1725594789738},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_80","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T08:41:43Z","timestamp":1309941703000},"page":"603-608","source":"Crossref","is-referenced-by-count":1,"title":["An Image Steganography Approach Based upon Matching\u00a0"],"prefix":"10.1007","author":[{"given":"Sukhpreet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Sumeet","family":"Kaur","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"80_CR1","unstructured":"Morkel, T., Eloff, J.H.P., Olivier, M.S.: An Overview of Image Steganography. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA 2005), Sandton, South Africa (2005)"},{"issue":"7","key":"80_CR2","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F. Petitcolas","year":"1999","unstructured":"Petitcolas, F., Anderson, R.J., Kuhn, M.G.: Information hiding: A survey. Proceeding of the IEEE\u00a087(7), 1062\u20131078 (1999)","journal-title":"Proceeding of the IEEE"},{"issue":"4","key":"80_CR3","doi-asserted-by":"publisher","first-page":"223","DOI":"10.3844\/jcssp.2007.223.232","volume":"3","author":"N. Nameer","year":"2007","unstructured":"Nameer, N., EL-Emam.: Hiding a Large Amount of Data with High Security Using Steganography Algorithm. Journal of Computer Science\u00a03(4), 223\u2013232 (2007)","journal-title":"Journal of Computer Science"},{"issue":"4","key":"80_CR4","first-page":"81","volume":"33","author":"A. Ibraheem","year":"2007","unstructured":"Ibraheem, A., Sada, A.: Hiding Data Using LSB-3. J. Basrah Researches (Sciences)\u00a033(4), 81\u201388 (2007)","journal-title":"J. Basrah Researches (Sciences)"},{"issue":"1","key":"80_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.3844\/jcssp.2009.33.38","volume":"5","author":"Al-Husainy","year":"2009","unstructured":"Al-Husainy, Mohammed, A.F.: Image Steganography by Mapping Pixels to Letters. Journal of Computer Science\u00a05(1), 33\u201338 (2009)","journal-title":"Journal of Computer Science"},{"key":"80_CR6","doi-asserted-by":"crossref","unstructured":"Parvez, M.T., Gutub, A.: RGB Intensity Based Variable-Bits Image Steganography. In: Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, pp. 653\u2013658 (2008)","DOI":"10.1109\/APSCC.2008.105"},{"issue":"1","key":"80_CR7","first-page":"56","volume":"2","author":"A. Gutub","year":"2010","unstructured":"Gutub, A.: Pixel Indicator Technique for RGB Image Steganography. Journal of Emerging Technologies In Web Intelligence\u00a02(1), 56\u201364 (2010)","journal-title":"Journal of Emerging Technologies In Web Intelligence"},{"issue":"6","key":"80_CR8","first-page":"1053","volume":"57","author":"V. Vijayalakshmi","year":"2009","unstructured":"Vijayalakshmi, V., Palanivelu, T.G., Nagaraj, V.: A Modulo Based Image Steganography Algorithm Against Statistical Analysis. IEEE Transactions on Signal Processing\u00a057(6), 1053\u20131056 (2009)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"22","key":"80_CR9","first-page":"3884","volume":"19","author":"H. Zhang","year":"2007","unstructured":"Zhang, H., Tang, H.: A Novel image steganography algorithm against statistical analysis. Proceeding of the IEEE\u00a019(22), 3884\u20133888 (2007)","journal-title":"Proceeding of the IEEE"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T18:52:57Z","timestamp":1553885577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_80","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}