{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:40:14Z","timestamp":1741347614405,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227196"},{"type":"electronic","value":"9783642227202"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22720-2_27","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:14:51Z","timestamp":1311610491000},"page":"269-275","source":"Crossref","is-referenced-by-count":0,"title":["Matrix Embedding Using Random Linear Codes and Its Steganalysis"],"prefix":"10.1007","author":[{"given":"P.","family":"Harmya","sequence":"first","affiliation":[]},{"given":"S. S.","family":"Anju","sequence":"additional","affiliation":[]},{"given":"Noopa","family":"Jagadeesh","sequence":"additional","affiliation":[]},{"given":"Aishwarya","family":"Nandakumar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"1","author":"J. Fridrich","year":"2006","unstructured":"Fridrich, J., Soukal, D.: Matrix Embedding for large payloads. IEEE Transactions on Information, Security and Forensics\u00a01(3), 390\u2013395 (2006)","journal-title":"IEEE Transactions on Information, Security and Forensics"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D.C. Wu","year":"2003","unstructured":"Wu, D.C., Tsai, W.H.: A Steganographic Method for Images By Pixel Value Differencing. Pattern Recognition Letters\u00a024, 1613\u20131626 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"27_CR3","volume-title":"The Theory of Error-correcting Codes","author":"F.J.M. Williams","year":"1997","unstructured":"Williams, F.J.M., Sloane, N.J.: The Theory of Error-correcting Codes. North-Holland, Amsterdam (1997)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proc. ITW 2003, pp. 151\u2013154 (2003)","DOI":"10.1109\/ITW.2003.1216717"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-69019-1_1","volume-title":"Transactions on Data Hiding and Multimedia Security III","author":"J. Bierbrauer","year":"2008","unstructured":"Bierbrauer, J., Fridrich, J.: Constructing Good Covering Codes for Applications in Steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security III. LNCS, vol.\u00a04920, pp. 1\u201322. Springer, Heidelberg (2008)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Practical Steganalysis-State of the Art. In: Proc. SPIE Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, California, vol. 4675, pp. 1\u201313 (January 2002)","DOI":"10.1117\/12.465263"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in grayscale and color images. In: Proc. ACM Workshop on Multimedia and Security, Ottawa, Canada, pp. 27\u201330 (2001)","DOI":"10.1145\/1232454.1232466"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks, on Steganographic Systems: Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools\u2013and Some Lessons Learned. In: 3rd International Workshop on Information Hiding (2000)","DOI":"10.1007\/10719724_5"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22720-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:05:41Z","timestamp":1741345541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22720-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227196","9783642227202"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22720-2_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}