{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:06:30Z","timestamp":1762430790239},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T00:00:00Z","timestamp":1385510400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1007\/s00034-013-9703-3","type":"journal-article","created":{"date-parts":[[2013,11,26]],"date-time":"2013-11-26T18:21:47Z","timestamp":1385490107000},"page":"1611-1626","source":"Crossref","is-referenced-by-count":10,"title":["A High Capacity Steganographic Method Based on Quantization Table Modification and F5 Algorithm"],"prefix":"10.1007","volume":"33","author":[{"given":"Cuiling","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yilin","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Shun","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,27]]},"reference":[{"key":"9703_CR1","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/ARES.2008.72","volume-title":"Third International Conference on Availability. Reliability and Security","author":"A. Amohammad","year":"2008","unstructured":"A. Amohammad, R.M. Hierons, G. Ghinea, High capacity steganographic method based upon JPEG, in Third International Conference on Availability. Reliability and Security, Washington (2008), pp.\u00a0544\u2013549"},{"key":"9703_CR2","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/AINA.2009.67","volume-title":"2009 International Conference on Advanced Information Networking and Applications","author":"A. Amohammad","year":"2009","unstructured":"A. Amohammad, G. Ghinea, R.M. Hierons, JPEG steganography: a performance evaluation of quantization tables, in 2009 International Conference on Advanced Information Networking and Applications, Bradford, UK (2009), pp. 471\u2013478"},{"key":"9703_CR3","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"C.C. Chang","year":"2002","unstructured":"C.C. Chang, T.S. Chen, L.Z. Chung, A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123\u2013138 (2002)","journal-title":"Inf. Sci."},{"key":"9703_CR4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/IAS.2009.340","volume-title":"2009 Fifth International Conference on Information Assurance and Security","author":"Y.S. Choi","year":"2009","unstructured":"Y.S. Choi, H.J. Kim, Improving the modified matrix encoding on steganography method, in 2009 Fifth International Conference on Information Assurance and Security (2009), pp. 205\u2013208"},{"key":"9703_CR5","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Proceedings 6th Information Hiding Workshop","author":"J. Fridrich","year":"2004","unstructured":"J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in Proceedings 6th Information Hiding Workshop, Berlin (2004), pp. 67\u201381"},{"key":"9703_CR6","first-page":"310","volume-title":"The 5th International Workshop on Information Hiding","author":"J. Fridrich","year":"2002","unstructured":"J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG image: breaking the F5 algorithm, in The 5th International Workshop on Information Hiding (Springer, Berlin, 2002), pp. 310\u2013323"},{"issue":"3","key":"9703_CR7","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/s00530-003-0100-9","volume":"9","author":"J. Fridrich","year":"2003","unstructured":"J. Fridrich, M. Goljan, D. Hogea, D. Soukal, Quantitative steganalysis: estimating secret message length. Multimed. Syst. 9(3), 288\u2013302 (2003). Special issue on multimedia security","journal-title":"Multimed. Syst."},{"issue":"10","key":"9703_CR8","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1109\/LSP.2010.2066110","volume":"17","author":"J.M. Guo","year":"2010","unstructured":"J.M. Guo, T.N. Le, Secret communication using JPEG double compression. IEEE Signal Process. Lett. 17(10), 879\u2013882 (2010)","journal-title":"IEEE Signal Process. Lett."},{"issue":"6","key":"9703_CR9","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1109\/76.867936","volume":"10","author":"J. Huang","year":"2000","unstructured":"J. Huang, Y.Q. Shi, Y. Shi, Embedding image watermarks in DC components. IEEE Trans. Circuits Syst. Video Technol. 10(6), 974\u2013979 (2000)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"9703_CR10","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/ICETET.2009.188","volume-title":"2009 2nd International Conference Emerging Trends in Engineering and Technology (ICETET)","author":"M. Ishaque","year":"2009","unstructured":"M. Ishaque, S.A. Sattar, Quality based JPEG steganography using balanced embedding technique, in 2009 2nd International Conference Emerging Trends in Engineering and Technology (ICETET) (2009), pp. 215\u2013221"},{"key":"9703_CR11","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/ACSSC.2011.6189990","volume-title":"2011 Conference Record of the Forty-Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR)","author":"Y.B. Jiang","year":"2011","unstructured":"Y.B. Jiang, M.S. Pattichis, JPEG image compression using quantization table optimization based on perceptual image quality assessment, in 2011 Conference Record of the Forty-Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) (2011), pp. 225\u2013229"},{"issue":"3","key":"9703_CR12","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s11859-011-0740-0","volume":"16","author":"C.L. Jiang","year":"2011","unstructured":"C.L. Jiang, Y.L. Pang, L. Guo, A high capacity steganographic method based on quantization table modification. Wuhan Univ. J. Nat. Sci. 16(3), 223\u2013227 (2011)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"9703_CR13","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/PST.2010.5593230","volume-title":"2010 Eighth Annual International Conference on Privacy, Security and Trust","author":"M. Kumar","year":"2010","unstructured":"M. Kumar, R. Newman, J3: high payload histogram neutral JPEG steganography, in 2010 Eighth Annual International Conference on Privacy, Security and Trust (2010), pp. 46\u201353"},{"key":"9703_CR14","doi-asserted-by":"crossref","first-page":"3099","DOI":"10.1016\/j.ins.2007.02.008","volume":"177","author":"X.X. Li","year":"2007","unstructured":"X.X. Li, J.J. Wang, A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177, 3099\u20133109 (2007)","journal-title":"Inf. Sci."},{"issue":"24","key":"9703_CR15","first-page":"123","volume":"38","author":"G.P. Lu","year":"2012","unstructured":"G.P. Lu, X.Y. Ye, Y.L. Wang, Y. Zhang, A F5 steganographic method based on quantization table modification. Comput. Eng. 38(24), 123\u2013127 (2012)","journal-title":"Comput. Eng."},{"issue":"1","key":"9703_CR16","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1049\/ip-vis:19960255","volume":"143","author":"D.M. Monro","year":"1996","unstructured":"D.M. Monro, B.G. Sherlock, Optimal quantization strategy for DCT image compression. IEE Proc., Vis. Image Signal Process. 143(1), 10\u201314 (1996)","journal-title":"IEE Proc., Vis. Image Signal Process."},{"key":"9703_CR17","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1109\/ACCT.2012.37","volume-title":"2012 Second International Conference on Advanced Computing & Communication Technologies (ACCT)","author":"S. Sachdeva","year":"2012","unstructured":"S. Sachdeva, A. Kumar, Colour image steganography based on modified quantization table, in 2012 Second International Conference on Advanced Computing & Communication Technologies (ACCT), (2012), pp. 309\u2013313"},{"key":"9703_CR18","first-page":"12","volume-title":"The Fourth International Conference on Computer and Information Technology, CIT\u201904","author":"H.W. Tseng","year":"2004","unstructured":"H.W. Tseng, C.C. Chang, Steganography using JPEG-compressed images, in The Fourth International Conference on Computer and Information Technology, CIT\u201904, 14\u201316 Sept (2004), pp. 12\u201317"},{"key":"9703_CR19","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1109\/CIMSim.2012.37","volume-title":"2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation","author":"N. Vongurai","year":"2012","unstructured":"N. Vongurai, S. Phimoltares, Frequency-based steganography using 32\u00d732 interpolated quantization table and discrete cosine transform, in 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, Kuantan, Malaysia (2012), pp. 249\u2013253"},{"issue":"1","key":"9703_CR20","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z. Wang","year":"2009","unstructured":"Z. Wang, A.C. Bovik, Mean squared error: love it or leave it?\u2014a new look at signal fidelity measures. IEEE Signal Process. Mag. 26(1), 98\u2013117 (2009)","journal-title":"IEEE Signal Process. Mag."},{"issue":"4","key":"9703_CR21","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"9703_CR22","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Proceedings of 4th International Workshop on Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"A. Westfeld, F5\u2014a steganographic algorithm: high capacity despite better steganalysis, in Proceedings of 4th International Workshop on Information Hiding (Springer, New York, 2001), pp. 289\u2013302"},{"issue":"1","key":"9703_CR23","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/TIP.2008.2007609","volume":"18","author":"E.H. Yang","year":"2009","unstructured":"E.H. Yang, L.J. Wang, Joint optimization of run-length coding, Huffman coding, and quantization table with complete baseline JPEG decoder compatibility. IEEE Trans. Image Process. 18(1), 63\u201374 (2009)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-013-9703-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-013-9703-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-013-9703-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T11:01:42Z","timestamp":1558522902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-013-9703-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,27]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["9703"],"URL":"https:\/\/doi.org\/10.1007\/s00034-013-9703-3","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,27]]}}}