{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:08:03Z","timestamp":1725538083663},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642318368"},{"type":"electronic","value":"9783642318375"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31837-5_60","type":"book-chapter","created":{"date-parts":[[2012,7,4]],"date-time":"2012-07-04T22:48:56Z","timestamp":1341442136000},"page":"416-421","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Steganographic Capacity Using Morphing Technique"],"prefix":"10.1007","author":[{"given":"Saiful","family":"Islam","sequence":"first","affiliation":[]},{"given":"Ekram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Phalguni","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann (2008)","key":"60_CR1","DOI":"10.1016\/B978-012372585-1.50015-2"},{"unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Prentice-Hall (2008)","key":"60_CR2"},{"issue":"1","key":"60_CR3","first-page":"56","volume":"2","author":"A.A. Gutub","year":"2010","unstructured":"Gutub, A.A.: Pixel Indicator Technique for RGB Image Steganography. Journal of Emerging in Web Intelligence\u00a02(1), 56\u201364 (2010)","journal-title":"Journal of Emerging in Web Intelligence"},{"issue":"1","key":"60_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11042-006-0008-4","volume":"30","author":"K. Bailey","year":"2006","unstructured":"Bailey, K., Curran, K.: An evaluation of image based steganography methods. Multimedia Tools Appl.\u00a030(1), 55\u201388 (2006)","journal-title":"Multimedia Tools Appl."},{"key":"60_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5-A Steganographic Algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"issue":"3","key":"60_CR6","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security & Privacy\u00a01(3), 32\u201344 (2003)","journal-title":"IEEE Security & Privacy"},{"issue":"3","key":"60_CR7","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/s00530-003-0100-9","volume":"9","author":"J.J. Fridrich","year":"2003","unstructured":"Fridrich, J.J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems\u00a09(3), 288\u2013302 (2003)","journal-title":"Multimedia Systems"},{"key":"60_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. -Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"unstructured":"Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington D.C., pp. 323\u2013335 (2001)","key":"60_CR9"},{"issue":"3","key":"60_CR10","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.aei.2005.04.003","volume":"19","author":"V.M. Potdar","year":"2005","unstructured":"Potdar, V.M., Khan, M.A., Chang, E., Ulieru, M., Worthington, P.R.: e-Forensics steganography system for secret information retrieval. Advanced Engineering Informatics\u00a019(3), 235\u2013241 (2005)","journal-title":"Advanced Engineering Informatics"},{"unstructured":"Stanley, C.: Pairs of Values and the Chi-squared Attack. Master\u2019s thesis, Department of Mathematics, Iowa State University (2005)","key":"60_CR11"},{"unstructured":"Vinther, M.: Smartmorph (2004), \n                    \n                      http:\/\/meesoft.logicnet.dk","key":"60_CR12"}],"container-title":["Communications in Computer and Information Science","Emerging Intelligent Computing Technology and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31837-5_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:49:19Z","timestamp":1620114559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31837-5_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642318368","9783642318375"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31837-5_60","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}