{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:40:45Z","timestamp":1743108045023,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811580604"},{"type":"electronic","value":"9789811580611"}],"license":[{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-8061-1_8","type":"book-chapter","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:08:45Z","timestamp":1607630925000},"page":"89-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Weighted Matrix-Based Random Data Hiding Scheme Within a Pair of Interpolated Image"],"prefix":"10.1007","author":[{"given":"Debkumar","family":"Bera","sequence":"first","affiliation":[]},{"given":"Biswapati","family":"Jana","sequence":"additional","affiliation":[]},{"given":"Partha","family":"Chowdhuri","sequence":"additional","affiliation":[]},{"given":"Debasis","family":"Giri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information hiding","author":"A Westfeld","year":"2001","unstructured":"Westfeld A (2001) F5\u2013a steganographic algorithm. Information hiding. Springer, Berlin, pp 289\u2013302"},{"issue":"6","key":"8_CR2","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.compeleceng.2011.08.006","volume":"37","author":"L Fan","year":"2011","unstructured":"Fan L, Gao T, Yang Q, Cao Y (2011) An extended matrix encoding algorithm for steganography of high embedding efficiency. Comput Electr Eng (Elsevier) 37(6):973\u2013981","journal-title":"Comput Electr Eng (Elsevier)"},{"issue":"8","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TCOMM.2002.801488","volume":"50","author":"Y-C Tseng","year":"2002","unstructured":"Tseng Y-C, Chen Y-Y, Pan H-K (2002) A secure data hiding scheme for binary images. IEEE Trans IEEE Commun 50(8):1227\u20131231","journal-title":"IEEE Trans IEEE Commun"},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1016\/j.compeleceng.2012.06.014","volume":"39","author":"L Fan","year":"2013","unstructured":"Fan L, Gao T, Cao Y (2013) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng (Elsevier) 39(3):873\u2013881","journal-title":"Comput Electr Eng (Elsevier)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. In: Proceedings of the 3rd international conference on multimedia and ubiquitous engineering MUE \u201909, pp 145\u2013152","DOI":"10.1109\/MUE.2009.35"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","volume":"52","author":"CF Lee","year":"2013","unstructured":"Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52:2237\u20132247. https:\/\/doi.org\/10.1007\/s11235-011-9529-x","journal-title":"Telecommun Syst"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.sigpro.2014.08.022","volume":"108","author":"TC Lu","year":"2015","unstructured":"Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77\u201389. https:\/\/doi.org\/10.1016\/j.sigpro.2014.08.022","journal-title":"Signal Process"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.sigpro.2016.03.023","volume":"128","author":"IF Jafar","year":"2016","unstructured":"Jafar IF, Darabkh KA, Al-Zubi RT, Saifan RR (2016) An efficient reversible data hiding algorithm using two steganographic images. Signal Process 128:98\u2013109. https:\/\/doi.org\/10.1016\/j.sigpro.2016.03.023","journal-title":"Signal Process"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.sigpro.2015.03.017","volume":"115","author":"TC Lu","year":"2015","unstructured":"Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Signal Process 115:195\u2013213. https:\/\/doi.org\/10.1016\/j.sigpro.2015.03.017","journal-title":"Signal Process"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.sigpro.2016.12.029","volume":"135","author":"H Yao","year":"2017","unstructured":"Yao H, Qin C, Tang Z, Tian Y (2017) Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels\u2019 coordinates with minimum distortion. Signal Process 135:26\u201335. https:\/\/doi.org\/10.1016\/j.sigpro.2016.12.029","journal-title":"Signal Process"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Chang CC, Lu TC, Hong G, Huang YH, Hsu YM (2013) A high payload data embedding scheme using dual stego-images with reversibility. In: Proceedings of the 9th international conference on information, communications and signal processing (ICICS), pp 1\u20135","DOI":"10.1109\/ICICS.2013.6782790"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Sixth International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-8061-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:13:03Z","timestamp":1607631183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-8061-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,11]]},"ISBN":["9789811580604","9789811580611"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-8061-1_8","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,12,11]]},"assertion":[{"value":"11 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}