{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T13:57:52Z","timestamp":1767967072891,"version":"3.49.0"},"publisher-location":"New Delhi","reference-count":18,"publisher":"Springer India","isbn-type":[{"value":"9788132222194","type":"print"},{"value":"9788132222200","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-2220-0_18","type":"book-chapter","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T08:00:18Z","timestamp":1419321618000},"page":"219-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Image Steganography Method Using Spread Spectrum Technique"],"prefix":"10.1007","author":[{"given":"M. P. S.","family":"Bhatia","sequence":"first","affiliation":[]},{"given":"Sunil Kumar","family":"Muttoo","sequence":"additional","affiliation":[]},{"given":"Manjot","family":"Bhatia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(4), 313\u2013336 (1996)","DOI":"10.1147\/sj.353.0313"},{"issue":"3\u20134","key":"18_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3\u20134), 313\u2013336 (1996). doi:10.1147\/sj.353.0313","journal-title":"IBM Syst. J."},{"key":"18_CR3","unstructured":"Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Steganography based secure communication. In: Proceedings of the Second International Springer Conference on Soft Computing for Problem Solving (SocProS 2012), India (2012)"},{"issue":"1","key":"18_CR4","first-page":"221","volume":"11","author":"M Bhatia","year":"2011","unstructured":"Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication protocol. Int. J. Adv. Eng. Sci. Technol. 11(1), 221\u2013225 (2011)","journal-title":"Int. J. Adv. Eng. Sci. Technol."},{"issue":"1","key":"18_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1080\/19393555.2013.780272","volume":"22","author":"M Bhatia","year":"2013","unstructured":"Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication with hidden group key. Inf. Secur. J. Glob. Perspect. 22(1), 21\u201334 (2013)","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Cox, J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proceedings of IEEE International Conference on Image Processing, vol. 111, pp. 243\u2013246, Lausanne, Switzerland, Sept 1996","DOI":"10.1109\/ICIP.1996.560429"},{"issue":"6","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259\u20131284 (1998)","journal-title":"Int. J. Bifurcat. Chaos"},{"key":"18_CR8","unstructured":"Gander, W.: Algorithms for the QR decomposition. Res. Rep. 80(02), 1251\u20131268 (1980)"},{"key":"18_CR9","unstructured":"Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., Alvi, A.: Pixel indicator high capacity technique for RGB image based steganography. In: Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications, pp. 18\u201321, Sharjah, UAE, 18\u201320 Mar 2008"},{"key":"18_CR10","unstructured":"Keshari, S., Modani, S.G.: Image encryption algorithm based on chaotic map lattice and Arnold cat map for secure transmission. IJCST 2(1), 132\u2013135 (2011)"},{"issue":"1","key":"18_CR11","first-page":"19","volume":"17","author":"V Kumar","year":"2011","unstructured":"Kumar, V., Muttoo, S.K.: A graph theoretic approach to sustainable steganography. MIS Rev. Int. J. 17(1), 19\u201337 (2011)","journal-title":"MIS Rev. Int. J."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26, 117\u2013129 (2005)","journal-title":"Chaos, Solitons Fractals"},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/jisp.2010100102","volume":"4","author":"SK Muttoo","year":"2010","unstructured":"Muttoo, S.K., Kumar, V.: Hiding message in map along pre Hamiltonian path. Int. J. Inf. Secur. Priv. 4(4), 21\u201334 (2010). doi:10.4018\/jisp.2010100102","journal-title":"Int. J. Inf. Secur. Priv."},{"issue":"4","key":"18_CR14","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1504\/IJESDF.2010.038612","volume":"3","author":"SK Muttoo","year":"2010","unstructured":"Muttoo, S.K., Kumar, V.: Hamiltonian graph approach to steganography. Int. J. Electron. Secur. Digit. Forensic 3(4), 311\u2013332 (2010). doi:10.1504\/IJESDF.2010.038612","journal-title":"Int. J. Electron. Secur. Digit. Forensic"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Smith, J.R., Comisky, B.O.: Modulation and information hiding in images. In: Information Hiding. First International Workshop. Lecture Notes in Computer Science. Springer, Berlin (1996)","DOI":"10.1007\/3-540-61996-8_42"},{"key":"18_CR16","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stalling","year":"1999","unstructured":"Stalling, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, New York (1999)"},{"key":"18_CR17","volume-title":"Adobe Photoshop CS2 for the Web: Hands-on Training","author":"T Staples","year":"2005","unstructured":"Staples, T., Weinman, L.: Adobe Photoshop CS2 for the Web: Hands-on Training. Peachpit Press, San Francisco (2005)"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"RZ Wang","year":"2000","unstructured":"Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34, 671\u2013683 (2000). doi:10.1016\/S0031-3203(00)00015-7","journal-title":"Pattern Recogn."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fourth International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2220-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T20:01:27Z","timestamp":1747252887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-2220-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,24]]},"ISBN":["9788132222194","9788132222200"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2220-0_18","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,24]]},"assertion":[{"value":"24 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}