{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:40:53Z","timestamp":1726411253351},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811034084"},{"type":"electronic","value":"9789811034091"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3409-1_6","type":"book-chapter","created":{"date-parts":[[2017,3,9]],"date-time":"2017-03-09T13:13:41Z","timestamp":1489065221000},"page":"85-100","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Image Steganographic Scheme Using $$8 \\times 8$$ Sudoku Puzzle"],"prefix":"10.1007","author":[{"given":"Debanjali","family":"Dey","sequence":"first","affiliation":[]},{"given":"Ambar","family":"Bandyopadhyay","sequence":"additional","affiliation":[]},{"given":"Sunanda","family":"Jana","sequence":"additional","affiliation":[]},{"given":"Arnab Kumar","family":"Maji","sequence":"additional","affiliation":[]},{"given":"Rajat Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,10]]},"reference":[{"key":"6_CR1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Steganography"},{"key":"6_CR2","first-page":"113","volume":"54","author":"M Hussain","year":"2013","unstructured":"Hussain, M., Hussain, M.: A survey of image steganography techniques. Int. J. Adv. Sci. Technol. 54, 113\u2013124 (2013)","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"6_CR3","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Sudoku"},{"key":"6_CR4","unstructured":"http:\/\/www.en.wikipedia.org\/wiki\/Pentomino"},{"key":"6_CR5","unstructured":"http:\/\/www.en.wikipedia.org\/wiki\/Tetris"},{"key":"6_CR6","unstructured":"http:\/\/mathworld.wolfram.com\/Heptomino.html"},{"key":"6_CR7","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Glossary_of_Sudoku"},{"key":"6_CR8","unstructured":"https:\/\/www.spacetelescope.org\/static\/projects\/fits_liberator\/image_processing.pdf"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using Sudoku. In: Proceedings of Third International Conference on Innovative Computing, Information and Control (ICICIC 2008) (2008)","DOI":"10.1109\/ICICIC.2008.149"},{"issue":"12","key":"6_CR10","doi-asserted-by":"crossref","first-page":"2528","DOI":"10.1016\/j.jss.2010.07.054","volume":"83","author":"HL Lee","year":"2010","unstructured":"Lee, H.L., Lee, C.F., Chen, L.H.: A perfect maze based steganographic method. J. Syst. Softw. 83(12), 2528\u20132535 (2010)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"6_CR11","first-page":"2741","volume":"2","author":"P Saradha","year":"2012","unstructured":"Saradha, P., Swamy, B.: Improving image data hiding capacity scheme using Sudoku puzzle in colour images. Int. J. Eng. Res. Appl. 2(3), 2741\u20132744 (2012)","journal-title":"Int. J. Eng. Res. Appl."},{"issue":"1","key":"6_CR12","first-page":"43","volume":"4","author":"L Tawade","year":"2012","unstructured":"Tawade, L., Mahajan, R., Kulthe, C.: Efficient & secure data hiding using secret reference matrix. Int. J. Netw. Secur. Appl. 4(1), 43\u201350 (2012)","journal-title":"Int. J. Netw. Secur. Appl."},{"issue":"2","key":"6_CR13","first-page":"447","volume":"66","author":"D Job","year":"2014","unstructured":"Job, D., Paul, V.: Image steganography technique using Sudoku puzzle and ECC algorithm for secured data transmission. J. Theoret. Appl. Inf. Technol. 66(2), 447\u2013459 (2014)","journal-title":"J. Theoret. Appl. Inf. Technol."},{"key":"6_CR14","unstructured":"Usha, B.A., Srinath, N.K., Anvith, E.: High capacity data embedding in image steganography using hard Sudoku puzzle. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 518\u2212525 (2015"},{"issue":"17","key":"6_CR15","first-page":"31","volume":"48","author":"I Sanmitra","year":"2012","unstructured":"Sanmitra, I., Pujeri, S., Shrikant, B., Usha, B.A.: Image steganography using Sudoku puzzle for secured data transmission. Int. J. Comput. Appl. 48(17), 31\u201335 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"6","key":"6_CR16","first-page":"29","volume":"2","author":"B Chithra","year":"2015","unstructured":"Chithra, B., Harinath, D., Murthy, M.V.R., Babu, K.R.: Enhancing security through steganography by using Sudoku puzzle and ECC algorithm. Int. J. Res. Sci. Eng. Technol. 2(6), 29\u201343 (2015)","journal-title":"Int. J. Res. Sci. Eng. Technol."},{"issue":"2","key":"6_CR17","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1504\/IJCSE.2013.053087","volume":"8","author":"BR Rajakumar","year":"2013","unstructured":"Rajakumar, B.R.: Static and adaptive mutation techniques for Genetic algorithm: A systematic comparative analysis. Int. J. Comput. Sci. Eng. 8(2), 180\u2013193 (2013)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"6_CR18","doi-asserted-by":"crossref","first-page":"27","DOI":"10.5815\/ijmecs.2012.06.04","volume":"6","author":"S Gupta","year":"2012","unstructured":"Gupta, S., Goyal, A., Bhushan, B.: Information hiding using least significant bit steganography and cryptography. Int. J. Modern Educ. Comput. Sci. 6, 27\u201334 (2012)","journal-title":"Int. J. Modern Educ. Comput. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3409-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T12:18:01Z","timestamp":1498393081000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3409-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811034084","9789811034091"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3409-1_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}