{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:10:46Z","timestamp":1770534646057,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642538414","type":"print"},{"value":"9783642538421","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-53842-1_9","type":"book-chapter","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T20:01:37Z","timestamp":1391198497000},"page":"99-110","source":"Crossref","is-referenced-by-count":14,"title":["Multibit Embedding Algorithm for Steganography of Palette-Based Images"],"prefix":"10.1007","author":[{"given":"Shoko","family":"Imaizumi","sequence":"first","affiliation":[]},{"given":"Kei","family":"Ozawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-61996-8_27","volume-title":"Information Hiding","author":"D. Kahn","year":"1996","unstructured":"Kahn, D.: The history of steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 1\u20135. Springer, Heidelberg (1996)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-24624-4_3","volume-title":"Digital Watermarking","author":"R. Chandramouli","year":"2004","unstructured":"Chandramouli, R., Kharrazi, M., Memon, N.D.: Image Steganography and Steganalysis: Concepts and Practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 35\u201349. Springer, Heidelberg (2004)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Niimi, M., Noda, H., Kawaguchi, E., Eason, R.O.: High capacity and secure digital steganography to palette-based images. In: Proc. of IEEE ICIP, pp. II-917\u2013II-920 (2002)","DOI":"10.1109\/ICIP.2002.1040101"},{"issue":"3","key":"9_CR4","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.patrec.2003.10.013","volume":"25","author":"M.-Y. Wu","year":"2004","unstructured":"Wu, M.-Y., Ho, Y.-K., Lee, J.-H.: An iterative method of palette-based image steganography. Pattern Recognition Letters\u00a025(3), 301\u2013309 (2004)","journal-title":"Pattern Recognition Letters"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Wang, X., Yao, Z., Li, C.-T.: A palette-based image steganographic method using colour quantisation. In: Proc. of IEEE ICIP, pp. II-1090\u2013II-1093 (2005)","DOI":"10.1109\/ICIP.2005.1530249"},{"issue":"11","key":"9_CR6","doi-asserted-by":"publisher","first-page":"2595","DOI":"10.1016\/j.sigpro.2011.05.015","volume":"91","author":"H. Zhao","year":"2011","unstructured":"Zhao, H., Wang, H., Khan, M.K.: Steganalysis for palette-based images using generalized difference image and color correlogram. Signal Processing\u00a091(11), 2595\u20132605 (2011)","journal-title":"Signal Processing"},{"key":"9_CR7","unstructured":"Machado, R.: EZ Stego, Stego Online (1997), http:\/\/www.stego.com"},{"key":"9_CR8","unstructured":"Fridrich, J.: A new steganographic method for palette-based image. In: Proc. of IS&T PICS, pp. 285\u2013289 (1999)"},{"issue":"5","key":"9_CR9","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/TCOMM.2004.826379","volume":"52","author":"C.-H. Tzeng","year":"2004","unstructured":"Tzeng, C.-H., Yang, Z.-F., Tsai, W.-H.: Adaptive data hiding in palette images by color ordering and mapping with security protection. IEEE Trans. Commun.\u00a052(5), 791\u2013800 (2004)","journal-title":"IEEE Trans. Commun."},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/LSP.2008.2001117","volume":"15","author":"X. Zhang","year":"2008","unstructured":"Zhang, X., Wang, S., Zhou, Z.: Multibit assignment steganography in palette images. IEEE Signal Proc. Lett.\u00a015, 553\u2013556 (2008)","journal-title":"IEEE Signal Proc. Lett."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Kim, S.-M., Cheng, Z., Yoo, K.-Y.: A new steganography scheme based on an index-color image. In: Proc. of International Conference on Information Technology: New Generations, pp. 376\u2013381 (2009)","DOI":"10.1109\/ITNG.2009.119"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Wang, C.-T., Liao, C.-H., Chen, R.-M.: High Capacity Image Data Hiding Scheme for Grouping Palette Index. In: Proc. of International Conference on Multimedia and Ubiquitous Engineering, pp. 197\u2013204 (2009)","DOI":"10.1109\/MUE.2009.44"},{"key":"9_CR13","unstructured":"Tanaka, G., Suetake, N., Uchino, E.: A steganographic method realizing high capacity data embedding for palette-based images. In: Proc. of International Workshop on Smart Info-Media Systems in Asia, pp. 92\u201395 (2009)"},{"key":"9_CR14","unstructured":"Onoe, M., Sasaki, M., Inamoto, Y.: SIDBA Standard Image Data Base. MIPC Report 79-1 (1979)"}],"container-title":["Lecture Notes in Computer Science","Image and Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-53842-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T18:41:47Z","timestamp":1746124907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-53842-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642538414","9783642538421"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-53842-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}