{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:44:56Z","timestamp":1725597896993},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_55","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:01:51Z","timestamp":1311609711000},"page":"535-544","source":"Crossref","is-referenced-by-count":1,"title":["An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing"],"prefix":"10.1007","author":[{"given":"Azzat A.","family":"Al-Sadi","sequence":"first","affiliation":[]},{"given":"El Sayed M.","family":"El-Alfy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proc. of the IEEE (special issue)\u00a087, 1062\u20131078 (1999)","journal-title":"Proc. of the IEEE (special issue)"},{"key":"55_CR2","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3923\/itj.2004.245.269","volume":"3","author":"K. Rabah","year":"2004","unstructured":"Rabah, K.: Steganography: The Art of Hiding Data. Information Tech. J.\u00a03, 245\u2013269 (2004)","journal-title":"Information Tech. J."},{"key":"55_CR3","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R.-Z. Wang","year":"2001","unstructured":"Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition\u00a034, 671\u2013683 (2001)","journal-title":"Pattern Recognition"},{"key":"55_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding Data in Images by Simple LSB Substitution. Pattern Recognition\u00a037, 469\u2013474 (2004)","journal-title":"Pattern Recognition"},{"key":"55_CR5","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D.-C. Wu","year":"2003","unstructured":"Wu, D.-C., Tsai, W.-H.: A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters\u00a024, 1613\u20131626 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Yang, C.-H., Wang, S.-J., Weng, C.-Y.: Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy. In: Proc. of the 3rd Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, vol.\u00a01, pp. 445\u2013448 (2007)","DOI":"10.1109\/IIHMSP.2007.4457584"},{"key":"55_CR7","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1016\/S0031-3203(02)00289-3","volume":"36","author":"C.C. Chang","year":"2003","unstructured":"Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy. Pattern Recognition\u00a036, 1583\u20131595 (2003)","journal-title":"Pattern Recognition"},{"key":"55_CR8","unstructured":"Yang, C.H., Weng, C.Y.: A Steganographic Method for Digital Images by Multi-pixel Differencing. In: Proc. Int. Comput. Symp (2006)"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Wu, H.-C., Tsai, C.-S., Hwang, M.-S.: Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods. In: IEE Proceedings Vision, Image and Signal Processing, vol.\u00a0152, pp. 611\u2013615 (2005)","DOI":"10.1049\/ip-vis:20059022"},{"key":"55_CR10","doi-asserted-by":"crossref","unstructured":"Ker, A.: Improved Detection of LSB Steganography in Grayscale Images. Information Hiding, 583\u2013592 (2005)","DOI":"10.1007\/978-3-540-30114-1_8"},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"Amirtharajan, R., Adharsh, D., Vignesh, V., Balaguru, R.J.B.: PVD Blend with Pixel Indicator-OPAP Composite for High Fidelity Steganography. International Journal of Computer Applications\u00a09 (2010)","DOI":"10.5120\/1275-1801"},{"key":"55_CR12","first-page":"16","volume":"1","author":"R. Amirtharajan","year":"2010","unstructured":"Amirtharajan, R., Behera, S.K., Swarup, M.A., Ashfaaq, M., Rayappan, J.B.B.: Colour Guided Colour Image Steganography. Universal Journal of Computer Science and Engineering Technology\u00a01, 16\u201323 (2010)","journal-title":"Universal Journal of Computer Science and Engineering Technology"},{"key":"55_CR13","unstructured":"Gutub, A., Mahmoud, A., Muhammad, A., Abdulrahman, S., Aleem, A.: Pixel Indicator High Capacity Technique for RGB Image Based Steganography. In: International Workshop on Signal Processing and its Applications (2008)"},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"Padmaa, M., Venkataramani, Y.: Zig-Zag PVD: A Nontraditional Approach. International Journal of Computer Applications, 5\u201310 (2010)","DOI":"10.5120\/928-1305"},{"key":"55_CR15","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A. Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing\u00a090, 727\u2013752 (2010)","journal-title":"Signal Processing"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Parvez, M., Gutub, A.: RGB Intensity Based Variable-Bits Image Steganography. In: Proceedings of IEEE Asia-Pacific Services Computing Conference, APSCC 2008 (2008)","DOI":"10.1109\/APSCC.2008.105"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,28]],"date-time":"2021-11-28T18:34:45Z","timestamp":1638124485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_55","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}