{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T15:54:33Z","timestamp":1767887673220,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642305665","type":"print"},{"value":"9783642305672","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30567-2_18","type":"book-chapter","created":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T07:10:40Z","timestamp":1349075440000},"page":"217-230","source":"Crossref","is-referenced-by-count":18,"title":["Digital Image Steganography: An FFT Approach"],"prefix":"10.1007","author":[{"given":"Tamer","family":"Rabie","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","volume-title":"Digital Image Processing","author":"K. Castleman","year":"1996","unstructured":"Castleman, K.: Digital Image Processing. Prentice-Hall, Upper Saddle (1996)"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recognition\u00a037, 469\u2013474 (2004)","journal-title":"Pattern Recognition"},{"issue":"4","key":"18_CR3","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Information Theory\u00a047(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Information Theory"},{"issue":"2","key":"18_CR4","first-page":"1","volume":"2","author":"K. Curran","year":"2003","unstructured":"Curran, K., Bailey, K.: An evaluation of image based steganography methods. International Journal of Digital Evidence\u00a02(2), 1\u201340 (2003)","journal-title":"International Journal of Digital Evidence"},{"key":"18_CR5","unstructured":"Forssen, P.-E., Granlund, G., Wikiund, J.: Channel representation of colour images (Tech. Rep. LiTH-ISYR-2418), Computer Vision Laboratory, Department of Electrical Engineering, Linkoping University, SE-581 83 Linkoping, Sweden (2002)"},{"issue":"2","key":"18_CR6","first-page":"1","volume":"3","author":"D. Guerchi","year":"2008","unstructured":"Guerchi, D., Harmain, H., Rabie, T., Mohamed, E.: Speech Secrecy: An FFT-based Approach, Special Issue on Evolving Computer Science Applications. International Journal of Mathematics and Computer Science, Lebanon\u00a03(2), 1\u201319 (2008)","journal-title":"International Journal of Mathematics and Computer Science, Lebanon"},{"key":"18_CR7","unstructured":"Guerchi, D., Rabie, T.: Narrowband CELP Hiding by Wideband Speech. In: The Ninth IASTED International Conference on Signal and Image Processing (SIP 2007), Honolulu, Hawaii, USA (2007)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Honsinger, C.: Data embedding using phase dispersion. In: IEE Seminar on Secure Images and Image Authentication (Ref. No. 2000\/039), London, UK, pp. 5\/1\u20135\/7. Eastman Kodak Co., Rochester (2000)","DOI":"10.1049\/ic:20000216"},{"issue":"6","key":"18_CR9","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TASSP.1975.1162738","volume":"23","author":"T. Huang","year":"1975","unstructured":"Huang, T., Burnett, J., Deczky, A.: The importance of phase in image processing filters. IEEE Trans. on ASSP\u00a023(6), 529\u2013542 (1975)","journal-title":"IEEE Trans. on ASSP"},{"key":"18_CR10","volume-title":"Proc. International Conference on Pattern Recognition (ICPR)","author":"A. Jain","year":"2002","unstructured":"Jain, A., Uludag, U., Hsu, R.: Hiding a face in a fingerprint image. In: Proc. International Conference on Pattern Recognition (ICPR), Quebec City, Canada (2002)"},{"key":"18_CR11","unstructured":"Dan, M.: Photoshop Lab Color: The Canyon Conundrum and Other Adventures in the Most Powerful Colorspace. Pearson Education, Berkeley, Calif. (2006) ISBN 0321356780"},{"issue":"8","key":"18_CR12","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"L.M. Marvel","year":"1999","unstructured":"Marvel, L.M., Charles, G., Boncelet, J., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Processing\u00a08(8), 1075\u20131083 (1999)","journal-title":"IEEE Trans. Image Processing"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/3-540-63930-6_111","volume-title":"Computer Vision - ACCV\u201998","author":"K. Nozaki","year":"1997","unstructured":"Nozaki, K., Niimi, M., Eason, R.O., Kawaguchi, E.: A Large Capacity Steganography Using Colour Bmp Images. In: Chin, R., Pong, T.-C. (eds.) ACCV 1998. LNCS, vol.\u00a01351, pp. 112\u2013119. Springer, Heidelberg (1997)"},{"issue":"5","key":"18_CR14","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/PROC.1981.12022","volume":"69","author":"A. Oppenheim","year":"1981","unstructured":"Oppenheim, A., Lim, J.: The importance of phase in signals. Proc. IEEE\u00a069(5), 529\u2013541 (1981)","journal-title":"Proc. IEEE"},{"issue":"11","key":"18_CR15","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1364\/JOSA.73.001413","volume":"73","author":"A. Oppenheim","year":"1983","unstructured":"Oppenheim, A., Lim, J., Curtis, S.: Signal synthesis and reconstruction from partial Fourier-domain information. Journal of the Optical Society of America\u00a073(11), 1413\u20131420 (1983)","journal-title":"Journal of the Optical Society of America"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"O\u2019Ruanaidh, J., Dowling, W., Boland, F.: Phase watermarking of digital images. In: Proc. IEEE International Conference on Image Processing (ICIP), Lausanne, Switzerland, September 16\u201319, vol.\u00a03, pp. 239\u2013242 (1996)","DOI":"10.1109\/ICIP.1996.560428"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. In: IEEE Security and Privacy Magazine, pp. 32\u201344. IEEE Computer Society (2003)","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Rabie, T.: Data Secrecy: An FFT Approach. In: Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications, ch. 2. IGI Global (April 2010)","DOI":"10.4018\/978-1-61520-903-3.ch002"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Rabie, T., Guerchi, D.: Magnitude Spectrum Speech Hiding. In: IEEE International Conference on Signal Processing and Communication (ICSPC 2007), Dubai, UAE, November 24-27 (2007)","DOI":"10.1109\/ICSPC.2007.4728527"},{"issue":"3","key":"18_CR20","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1504\/IJAMC.2007.013952","volume":"1","author":"T. Rabie","year":"2007","unstructured":"Rabie, T.: Frequency-domain data hiding based on the Matryoshka principle. Int. J. Advanced Media and Communication\u00a01(3), 298\u2013312 (2007)","journal-title":"Int. J. Advanced Media and Communication"},{"key":"18_CR21","first-page":"1","volume-title":"Proceedings of the IEEE International Conference on Innovations in Information Technology (IIT 2006)","author":"T. Rabie","year":"2006","unstructured":"Rabie, T.: A Novel Compression Technique for Super Resolution Color Photography. In: Proceedings of the IEEE International Conference on Innovations in Information Technology (IIT 2006), November 19-21, pp. 1\u20135. Jumeirah Beach Hotel, Dubai (2006)"},{"issue":"2","key":"18_CR22","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1117\/1.1668279","volume":"13","author":"T. Rabie","year":"2004","unstructured":"Rabie, T.: Adaptive hybrid mean and median filtering of high-ISO long-exposure sensor noise for digital photography. SPIE Journal of Electronic Imaging\u00a013(2), 264\u2013277 (2004)","journal-title":"SPIE Journal of Electronic Imaging"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Ramkumar, M., Akansu, A., Alatan, A.: A robust data hiding scheme for images using DFT. In: Proc. IEEE International Conference on Image Processing (ICIP), pp. 1\u20135 (1999)","DOI":"10.1109\/ICIP.1999.822886"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Schanda, J.: Colorimetry, p. 61. Wiley-Interscience (2007) ISBN 9780470049044","DOI":"10.1002\/9780470175637"},{"issue":"12","key":"18_CR25","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/TIP.2004.837557","volume":"13","author":"K. Solanki","year":"2004","unstructured":"Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Robust image-adaptive data hiding using erasure and error correction. IEEE Trans. Image Processing\u00a013(12), 1627\u20131639 (2004)","journal-title":"IEEE Trans. Image Processing"},{"key":"18_CR26","unstructured":"Tan, C.: Image Camou-Flaging using Phase Randomization(2002), http:\/\/pachome2.paci.c.net.sg\/chewkeong\/ImgCamou.pdf"},{"issue":"10","key":"18_CR27","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1364\/JOSAA.7.001943","volume":"7","author":"A. Watson","year":"1990","unstructured":"Watson, A.: Perceptual-components architecture for digital video. Journal of the Optical Society of America A\u00a07(10), 1943\u20131954 (1990)","journal-title":"Journal of the Optical Society of America A"},{"key":"18_CR28","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"issue":"6","key":"18_CR29","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TIP.2003.810588","volume":"12","author":"M. Wu","year":"2003","unstructured":"Wu, M., Liu, B.: Data hiding in image and video: part I \u2013 fundamental issues and solutions. IEEE Trans. Image Processing\u00a012(6), 685\u2013695 (2003)","journal-title":"IEEE Trans. Image Processing"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30567-2_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T20:55:18Z","timestamp":1744232118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30567-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642305665","9783642305672"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30567-2_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}