{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:42:45Z","timestamp":1725882165720},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_77","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T03:13:59Z","timestamp":1489634039000},"page":"777-785","source":"Crossref","is-referenced-by-count":1,"title":["Active Steganalysis on SVD-Based Embedding Algorithm"],"prefix":"10.1007","author":[{"given":"P. P.","family":"Amritha","sequence":"first","affiliation":[]},{"given":"Rithu P.","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Sethumadhavan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"77_CR1","doi-asserted-by":"crossref","unstructured":"Amritha, P. P., & Gireesh, T. K. A Survey on Digital Image Steganographic Methods. In Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, pp. 250\u2013258. (2010).","DOI":"10.4018\/978-1-60960-123-2.ch018"},{"key":"77_CR2","doi-asserted-by":"crossref","unstructured":"R. Chandramouli., M. Kharrazi., N. Memon. Image steganography and steganalysis: Concepts and practice. In: T. Kalker, Y.M. Ro, and I. Cox, editors, Digital Watermarking, vol. 2939, pp. 35\u201349. Springer, Heidelberg (2004).","DOI":"10.1007\/978-3-540-24624-4_3"},{"key":"77_CR3","unstructured":"Y. J. Chanu., K. M. Singh., and T. Themrichon. A robust steganographic method based on singular value decomposition. Int. J. Inf. Comput. Technol 4 (7), pp. 717\u2013726. (2014)."},{"key":"77_CR4","doi-asserted-by":"crossref","unstructured":"C. Bergman., and D. Jennifer. Unitary embedding for data hiding with the SVD. In Electronic Imaging, International Society for Optics and Photonics, pp. 619\u2013630. (2005).","DOI":"10.1117\/12.587796"},{"key":"77_CR5","unstructured":"C. C. Chang, C.C. Lin and Y.S. Hu, An SVD oriented watermark embedding scheme with high qualities for the restored images, IJICIC, vol. 3, no. 3, pp. 609\u2013620, (2007)."},{"key":"77_CR6","doi-asserted-by":"crossref","unstructured":"K.L. Chung, W.N. Yang, Y.H. Huang, S. T. Wu and Y. C. Hsu, On SVD- based watermarking algorithm, Elsevier Science Direct Applied Mathematics and Computation, vol. 188\u00a0pp. 54\u201357. (2007).","DOI":"10.1016\/j.amc.2006.09.117"},{"key":"77_CR7","unstructured":"Chanu, Yambem Jina, Kh Manglem Singh, and Themrichon Tuithung. Steganography Technique based on SVD. International Journal of Research in Engineering and Technology (IJRET) vol. 6, pp. 293\u2013297. (2012)."},{"key":"77_CR8","doi-asserted-by":"crossref","unstructured":"Gupta, P., Srivastava, P., Bhardwaj, S., & Bhateja, V. A modified PSNR metric based on HVS for quality assessment of color images. In Communication and Industrial Application (ICCIA), IEEE, pp. 1\u20134. (2011).","DOI":"10.1109\/ICCIndA.2011.6146669"},{"key":"77_CR9","doi-asserted-by":"crossref","unstructured":"Bhateja, Vikrant, Aastha Srivastava, and Aseem Kalsi. Fast SSIM index for color images employing reduced-reference evaluation. International Conference on Frontiers of Intelligent Computing: Theory and Applications. Springer, vol. 247, pp. 451\u2013 458. (2014).","DOI":"10.1007\/978-3-319-02931-3_51"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T16:31:44Z","timestamp":1568910704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_77","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}