{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:14:35Z","timestamp":1747282475074,"version":"3.40.5"},"publisher-location":"New Delhi","reference-count":21,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132222194"},{"type":"electronic","value":"9788132222200"}],"license":[{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-2220-0_43","type":"book-chapter","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T08:00:18Z","timestamp":1419321618000},"page":"521-531","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Selected Bit Replacement Steganography Over SMQT Preprocessed Digital Image"],"prefix":"10.1007","author":[{"given":"K.","family":"Jithesh","sequence":"first","affiliation":[]},{"given":"P. Babu","family":"Anto","sequence":"additional","affiliation":[]},{"given":"P. K.","family":"Reshma","sequence":"additional","affiliation":[]},{"given":"M.","family":"Aravindhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"key":"43_CR1","volume-title":"Cryptography and Network Security-Principles and Practice","author":"W Stalling","year":"2006","unstructured":"Stalling, W.: Cryptography and Network Security-Principles and Practice, 4th edn. Pearson Prentice Hall of India P. Ltd, India (2006)","edition":"4"},{"key":"43_CR2","unstructured":"Shih, Y.F.: Digital Watermarking and Steganography Fundamentals and Technique. CRC Press, Taylor & Francis Group, Boca Raton, London (2008)"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Petitcolas, F., Katzenbeisser, S.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech house, inc., Norwood (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Sel. Areas in Commun. 16(4), 474\u2013481 (1998) (Special Issue on Copyright and Privacy Protection)","DOI":"10.1109\/49.668971"},{"issue":"3","key":"43_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan, C.K., Chen, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469\u2013474 (2004)","journal-title":"Pattern Recogn."},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Pai, P.Y., Yeh, C.M. , Chan, Y.K.: A high payload frequency-based reversible image hiding method. Inf. Sci. 180, 2286\u20132298 (2010)","DOI":"10.1016\/j.ins.2010.01.034"},{"key":"43_CR7","unstructured":"Nilsson, M., Dahl, M., Claesson, I.: The successive mean quantization transform. In: Proceeding of International Conference on Acoustics, Speech, and Signal Processing, pp. 429\u2013432 (2005)"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Lie, W.N., Chang, L.C.: Data hiding in images with adaptive numbers of least significant bits based on the human visual system. In: Proceedings of IEEE International Conference on Image Processing, vol. 1, pp. 286\u2013290 (1999)","DOI":"10.1109\/ICIP.1999.821615"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, C.Y., Wang, Y.Z.: A high payload VQ steganography method for binary images. In: Proceedings of the 6th International Workshop on Digital Watermarking, pp. 467\u2013481 (2006)","DOI":"10.1007\/978-3-540-92238-4_36"},{"issue":"10","key":"43_CR10","doi-asserted-by":"publisher","first-page":"3104","DOI":"10.1016\/j.patcog.2008.03.021","volume":"41","author":"Yi-Pei Hsieh","year":"2008","unstructured":"Hsieh, Yi-Pei, Chang, Chin-Chen, Liu, Li-Jen: A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity. Pattern Recogn. 41(10), 3104\u20133113 (2008)","journal-title":"Pattern Recogn."},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Lou, D.C. et.al.: A novel adaptive steganography based on local complexity and human vision sensitivity. J. Sys. Softw. 83, 1236\u20131248 (2010)","DOI":"10.1016\/j.jss.2010.01.050"},{"issue":"3","key":"43_CR12","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727\u2013752 (2010)","journal-title":"Sig. Process."},{"key":"43_CR13","unstructured":"Kodovsk\u00fd, J., Fridrich, J., Holub, V.: Ensemble Classifiers for Steganalysis of Digital Media. IEEE, New York"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Dietterich, T.G.: Ensemble methods in machine learning. Multiple Classifier Systems. LNCS, vol. 1857, pp. 1\u201315. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45014-9_1"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Munteanu, C., Rosa, A.: Towards automatic image enhancement using genetic algorithms. In: Proceedings of the 2000 Congress on Evolutionary Computation, vol. 2, pp. 1535\u20131542 (2000)","DOI":"10.1109\/CEC.2000.870836"},{"issue":"1","key":"43_CR16","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.jss.2007.01.049","volume":"81","author":"CM Wang","year":"2008","unstructured":"Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S.: A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1), 150\u2013158 (2008)","journal-title":"J. Syst. Softw."},{"issue":"11","key":"43_CR17","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1016\/S0031-3203(03)00221-8","volume":"36","author":"CC Thien","year":"2003","unstructured":"Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36(11), 2875\u20132881 (2003)","journal-title":"Pattern Recogn."},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Chang, C.C., .Lin, C.Y., Wang, Y.Z.: New image steganographic methods using run-length approach. Inf. Sci. 176, 3393\u20133408 (2006)","DOI":"10.1016\/j.ins.2006.02.008"},{"key":"43_CR19","unstructured":"www.mathworks.com\/help\/images\/ref\/impixelinfoval.html"},{"key":"43_CR20","doi-asserted-by":"crossref","unstructured":"Dong, Y., Han, K.: Boosting SVM classifiers by ensemble. In: Proceeding of 14th International ACM Conference on World Wide Web, pp. 1072\u20131073 (2005)","DOI":"10.1145\/1062745.1062874"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proceeding of ACM Multimedia Workshop, Germany (2004)","DOI":"10.1145\/1022431.1022435"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fourth International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2220-0_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T20:01:32Z","timestamp":1747252892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-2220-0_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,24]]},"ISBN":["9788132222194","9788132222200"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2220-0_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,12,24]]},"assertion":[{"value":"24 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}