{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:03:22Z","timestamp":1725739402815},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642379482"},{"type":"electronic","value":"9783642379499"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37949-9_69","type":"book-chapter","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T11:42:10Z","timestamp":1372938130000},"page":"794-800","source":"Crossref","is-referenced-by-count":8,"title":["Design of an Edge Detection Based Image Steganography with High Embedding Capacity"],"prefix":"10.1007","author":[{"given":"Arup Kumar","family":"Pal","sequence":"first","affiliation":[]},{"given":"Tarok","family":"Pramanik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W. Stalling","year":"2007","unstructured":"Stalling, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Pearson Education, India (2007)","edition":"4"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"Lu, C.-S.: Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing (2005)","DOI":"10.4018\/978-1-59140-192-6"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: Military Communications Conference, MILCOM 2008, vol.\u00a01-6, pp. 16\u201319. IEEE (November 2008)","DOI":"10.1109\/MILCOM.2008.4753107"},{"key":"69_CR4","unstructured":"Cvejic, N., Seppanen, T.: Increasing the capacity of LSB-based audio steganography. In: 2002 IEEE Workshop on Multimedia Signal Processing, December 9-11, pp. 336\u2013338 (2002)"},{"issue":"3","key":"69_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition\u00a037(3), 469\u2013474 (2004)","journal-title":"Pattern Recognition"},{"key":"69_CR6","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1016\/j.jss.2012.05.027","volume":"85","author":"E. Satira","year":"2012","unstructured":"Satira, E., Isikb, H.: A compression-based text steganography method. The Journal of Systems and Software\u00a085, 2385\u20132394 (2012)","journal-title":"The Journal of Systems and Software"},{"issue":"2","key":"69_CR7","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1049\/el:20001429","volume":"36","author":"R.Z. Wang","year":"2000","unstructured":"Wang, R.Z., Lin, C.P., Lin, J.C.: Hididng data in images by optimal moderately-significant-bit replacement. IEE Electronics Letters\u00a036(2), 2069\u20132070 (2000)","journal-title":"IEE Electronics Letters"},{"issue":"3","key":"69_CR8","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R.Z. Wang","year":"2001","unstructured":"Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition\u00a034(3), 671\u2013683 (2001)","journal-title":"Pattern Recognition"},{"key":"69_CR9","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1016\/j.eswa.2009.09.050","volume":"37","author":"W.J. Chen","year":"2010","unstructured":"Chen, W.J., Chang, C.C., Le, T.H.: High payload steganography mechanism using hybrid edge detector. Expert Systems with Applications\u00a037, 3292\u20133301 (2010)","journal-title":"Expert Systems with Applications"},{"key":"69_CR10","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.cviu.2006.11.002","volume":"107","author":"Y.H. Yu","year":"2007","unstructured":"Yu, Y.H., Chang, C.C., Lin, I.C.: A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding\u00a0107, 183\u2013194 (2007)","journal-title":"Computer Vision and Image Understanding"},{"key":"69_CR11","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"2008","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Pearson Education, India (2008)","edition":"3"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37949-9_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T10:52:33Z","timestamp":1557917553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37949-9_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642379482","9783642379499"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37949-9_69","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}