{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:32:46Z","timestamp":1758274366327,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666155"},{"type":"electronic","value":"9789811666162"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6616-2_48","type":"book-chapter","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:03:01Z","timestamp":1650715381000},"page":"491-500","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Index-Based Improved High Capacity Data Hiding Technique"],"prefix":"10.1007","author":[{"given":"Pratap Chandra","family":"Mandal","sequence":"first","affiliation":[]},{"given":"Imon","family":"Mukherjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,24]]},"reference":[{"key":"48_CR1","unstructured":"Boehmm, E.: Stegexpose: a tool for detecting LSB steganography (2014). https:\/\/github.com\/b3dk7\/StegExpose"},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Das, S., Muhammad, K., Bakshi, S., Mukherjee, I., Sa, P.K., Sangaiah, A.K., Bruno, A.: Lip biometric template security framework using spatial steganography. Pattern Recognit. Lett. 126, 102\u2013110 (2019)","DOI":"10.1016\/j.patrec.2018.06.026"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Grajeda\u00a0Mar\u00edn, I.R., Montes\u00a0Venegas, H.A., Marcial\u00a0Romero, J.R., Hern\u00e1ndez\u00a0Serv\u00edn, J.A., Mu\u00f1oz\u00a0Jim\u00e9nez, V., Luna, G.D.I.: A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. Int. J. Pattern Recognit. Artif. Intell. 32(01), 1860010\u201317 (2018)","DOI":"10.1142\/S0218001418600108"},{"key":"48_CR4","unstructured":"Images. The BOSSbase-1.01 Database. Binghamton University. Available from: http:\/\/dde.binghamton.edu\/download\/"},{"key":"48_CR5","unstructured":"Images. University of Southern California. The USC-SIPI Image Database (2019). Available from: http:\/\/sipi.usc.edu\/database\/database.php"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Jung, K.H.: Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. J. Real-Time Image Process. 14(1), 127\u2013136 (2018)","DOI":"10.1007\/s11554-017-0719-y"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Jung, K.H., Yoo, K.Y.: High-capacity index based data hiding method. Multimed. Tools Appl. 74(6), 2179\u20132193 (2015)","DOI":"10.1007\/s11042-014-2081-4"},{"key":"48_CR8","first-page":"47","volume":"43","author":"Z Li","year":"2018","unstructured":"Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on PSO. J. Inf. Secur. Appl. 43, 47\u201352 (2018)","journal-title":"J. Inf. Secur. Appl."},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Liu, H.H., Lin, Y.C., Lee, C.M.: A digital data hiding scheme based on pixel-value differencing and side match method. Multimed. Tools Appl. 78(9), 12157\u201312181 (2019)","DOI":"10.1007\/s11042-018-6766-y"},{"key":"48_CR10","first-page":"1","volume":"167","author":"W Liu","year":"2020","unstructured":"Liu, W., Yin, X., Wei, L., Zhang, J., Zeng, J., Shi, S., Mao, M.: Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process. 167, 1\u201310 (2020)","journal-title":"Signal Process."},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Z.L., Pun, C.M.: Reversible data-hiding in encrypted images by redundant space transfer. Inf. Sci. 433, 188\u2013203 (2018)","DOI":"10.1016\/j.ins.2017.12.044"},{"key":"48_CR12","unstructured":"Mandal, P.C., Mukherjee, I., Chatterji, B.N.: High capacity reversible and secured data hiding in images using interpolation and difference expansion technique. Multimed. Tools Appl. 1\u201322 (2021)"},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed. Tools Appl. 76(5), 7445\u20137471 (2017)","DOI":"10.1007\/s11042-016-3319-0"},{"key":"48_CR14","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2019.03.008","volume":"487","author":"C Qin","year":"2019","unstructured":"Qin, C., Qian, X., Hong, W., Zhang, X.: An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf. Sci. 487, 176\u2013192 (2019)","journal-title":"Inf. Sci."},{"key":"48_CR15","doi-asserted-by":"crossref","unstructured":"Shen, S.Y., Huang, L.H.: A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput. Secur. 48, 131\u2013141 (2015)","DOI":"10.1016\/j.cose.2014.07.008"},{"key":"48_CR16","doi-asserted-by":"crossref","unstructured":"Singh, A.K.: Data hiding: current trends, innovation and potential challenges. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) (2020)","DOI":"10.1145\/3382772"},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"Weng, S., Zhang, C., Zhang, T., Chen, K.: High capacity reversible data hiding in encrypted images using SIBRW and GCC. J. Vis. Commun. Image Represent. 102932 (2020)","DOI":"10.1016\/j.jvcir.2020.102932"},{"key":"48_CR18","doi-asserted-by":"crossref","unstructured":"Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24(9\u201310), 1613\u20131626 (2003)","DOI":"10.1016\/S0167-8655(02)00402-6"}],"container-title":["Smart Innovation, Systems and Technologies","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6616-2_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:14:40Z","timestamp":1650716080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6616-2_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666155","9789811666162"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6616-2_48","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}