{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:05:32Z","timestamp":1767337532306,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T00:00:00Z","timestamp":1434067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s00500-015-1728-z","type":"journal-article","created":{"date-parts":[[2015,6,11]],"date-time":"2015-06-11T09:40:40Z","timestamp":1434015640000},"page":"3331-3339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["False and multi-secret steganography in digital images"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8298-8627","authenticated-orcid":false,"given":"Marek R.","family":"Ogiela","sequence":"first","affiliation":[]},{"given":"Katarzyna","family":"Koptyra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,12]]},"reference":[{"key":"1728_CR1","unstructured":"Bailey K, Curran K (2005) Steganography\u2014The Art of Hiding Information. Booksurge Publishing"},{"issue":"4","key":"1728_CR2","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1109\/TIFS.2006.885020","volume":"1","author":"U Budhia","year":"2006","unstructured":"Budhia U, Kundur D, Zourntos T (2006) Digital video steganalysis exploiting statistical visibility in the temporal domain. Inf Forensics Secur IEEE Trans 1(4):502\u2013516","journal-title":"Inf Forensics Secur IEEE Trans"},{"issue":"5","key":"1728_CR3","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1016\/j.jss.2006.07.006","volume":"80","author":"A Castiglione","year":"2007","unstructured":"Castiglione A, De Santis A, Soriente C (2007) Taking advantages of a disadvantage: Digital forensics and steganography using document metadata. J Syst Softw 80(5):750\u2013764","journal-title":"J Syst Softw"},{"issue":"2","key":"1728_CR4","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.camwa.2011.07.068","volume":"63","author":"A Castiglione","year":"2012","unstructured":"Castiglione A, De Santis A, Fiore U, Palmieri F (2012) An asynchronous covert channel using spam. Comput Math Appl 63(2):437\u2013447","journal-title":"Comput Math Appl"},{"key":"1728_CR5","doi-asserted-by":"crossref","unstructured":"Castiglione A, D\u2019Alessio B, De Santis A (2011a) Steganography and secure communication on online social networks and online photo sharing. In: Broadband and Wireless Computing, Communication and Applications (BWCCA), International Conference on. pp 363\u2013368","DOI":"10.1109\/BWCCA.2011.60"},{"key":"1728_CR6","doi-asserted-by":"crossref","unstructured":"Castiglione A, D\u2019Alessio B, De Santis A, Palmieri F (2011b) New steganographic techniques for the OOXML file format. In: Proceedings of the IFIP WG 8.4\/8.9 International Cross Domain Conference on Availability, Reliability and Security for Business, Enterprise and Health Information Systems. Springer, Berlin, Heidelberg, pp 344\u2013358 (ARES\u201911)","DOI":"10.1007\/978-3-642-23300-5_27"},{"key":"1728_CR7","doi-asserted-by":"crossref","unstructured":"Castiglione A, De Santis A, Fiore U, Palmieri F (2011c) E-mail-based covert channels for asynchronous message steganography. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Fifth International Conference on. pp 503\u2013508","DOI":"10.1109\/IMIS.2011.133"},{"key":"1728_CR8","volume-title":"Digital Image Steganography: Concepts, Algorithms, and Applications","author":"A Cheddad","year":"2009","unstructured":"Cheddad A (2009) Digital Image Steganography: Concepts, Algorithms, and Applications. VDM Verlag Dr, M\u00fcller"},{"key":"1728_CR9","doi-asserted-by":"crossref","unstructured":"Cox IJ, Miller ML, Bloom J, Fridrich J, Kalker J (2008) Digital watermarking and steganography. Morgan Kaufmann Publishers, Burlington","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"1728_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich JJ, Goljan M, Hogea D (2003) Steganalysis of JPEG images: breaking the F5 algorithm. Revised Papers from the 5th International Workshop on Information Hiding, IH \u201902. Springer, London, pp. 310\u2013323","DOI":"10.1007\/3-540-36415-3_20"},{"key":"1728_CR11","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2010","unstructured":"Fridrich J (2010) Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge"},{"issue":"4","key":"1728_CR12","doi-asserted-by":"crossref","first-page":"043017","DOI":"10.1117\/1.JEI.21.4.043017","volume":"21","author":"T Hachaj","year":"2012","unstructured":"Hachaj T, Ogiela MR (2012) Framework for cognitive analysis of dynamic perfusion computed tomography with visualization of large volumetric data. J Electron Imag 21(4):043017","journal-title":"J Electron Imag"},{"key":"1728_CR13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.neucom.2013.04.030","volume":"122","author":"T Hachaj","year":"2013","unstructured":"Hachaj T, Ogiela MR (2013) Application of neural networks in detection of abnormal brain perfusion regions. Neurocomputing 122:33\u201342","journal-title":"Neurocomputing"},{"key":"1728_CR14","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"S Katzenbeisser","year":"2000","unstructured":"Katzenbeisser S, Petitcolas FA (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood"},{"key":"1728_CR15","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.ieri.2013.11.004","volume":"4","author":"V Nagaraj","year":"2013","unstructured":"Nagaraj V, Vijayalakshmi V, Zayaraz G (2013) Color Image Steganography based on Pixel Value Modification Method Using Modulus Function. IERI Procedia 4:17\u201324","journal-title":"IERI Procedia"},{"issue":"2","key":"1728_CR16","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.camwa.2010.02.028","volume":"60","author":"MR Ogiela","year":"2010","unstructured":"Ogiela MR, Ogiela U (2010) The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Comput Math Appl 60(2):267\u2013271","journal-title":"Comput Math Appl"},{"issue":"2","key":"1728_CR17","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.camwa.2011.10.038","volume":"63","author":"MR Ogiela","year":"2012","unstructured":"Ogiela MR, Ogiela U (2012) Linguistic protocols for secure information management and sharing. Comput Math Appl 63(2):564\u2013572","journal-title":"Comput Math Appl"},{"key":"1728_CR18","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.jnca.2013.05.005","volume":"38","author":"L Ogiela","year":"2014","unstructured":"Ogiela L, Ogiela MR (2014) Cognitive Systems and Bio-inspired Computing in Homeland Security. J Netw Comput Appl 38:34\u201342","journal-title":"J Netw Comput Appl"},{"issue":"12","key":"1728_CR19","doi-asserted-by":"crossref","first-page":"2587","DOI":"10.1007\/s00500-014-1442-2","volume":"18","author":"MR Ogiela","year":"2014","unstructured":"Ogiela MR, Sulkowski P (2014) Protocol for irreversible off-line transactions in anonymous electronic currency exchange. Soft Comput 18(12):2587\u20132594","journal-title":"Soft Comput"},{"key":"1728_CR20","doi-asserted-by":"crossref","unstructured":"Ogiela L, Ogiela MR (2011) Semantic analysis processes in advanced pattern understanding systems. In: Kim TH et al (eds) Communications in Computer and Information Science, vol. 195. Springer, Berlin, Heidelberg, pp 26\u201330","DOI":"10.1007\/978-3-642-24267-0_4"},{"key":"1728_CR21","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.image.2014.11.008","volume":"31","author":"SY Ong","year":"2015","unstructured":"Ong SY, Wong KS, Qi X, Tanaka K (2015) Beyond format-compliant encryption for JPEG image. Signal Process Image Commun 31:47\u201360","journal-title":"Signal Process Image Commun"},{"key":"1728_CR22","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.ins.2014.02.007","volume":"277","author":"K Qazanfari","year":"2014","unstructured":"Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: Generalization of LSB $$^{++}$$ + + . Inf Sci 277:90\u2013101","journal-title":"Inf Sci"},{"key":"1728_CR23","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13\u201314","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13\u201314:95\u2013113","journal-title":"Comput Sci Rev"},{"key":"1728_CR24","doi-asserted-by":"crossref","first-page":"3972","DOI":"10.1016\/j.ijleo.2014.01.149","volume":"125","author":"M Tang","year":"2014","unstructured":"Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik 125:3972\u20133976","journal-title":"Optik"},{"key":"1728_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0140525X00067248","volume":"15","author":"E Thompson","year":"1992","unstructured":"Thompson E, Palacios A, Varela FJ (1992) Ways of coloring: comparative color vision as a case study for cognitive science. Behav Brain Sci 15:1\u201326","journal-title":"Behav Brain Sci"},{"key":"1728_CR26","doi-asserted-by":"crossref","unstructured":"Westfeld A (2001) F5\u2013a steganographic algorithm: high capacity despite better steganalysis. In: 4th International Workshop on Information Hiding. Springer, pp 289\u2013302","DOI":"10.1007\/3-540-45496-9_21"},{"key":"1728_CR27","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2013.08.012","volume":"254","author":"H-D Yuan","year":"2014","unstructured":"Yuan H-D (2014) Secret sharing with multi-cover adaptive steganography. Inf Sci 254:197\u2013212","journal-title":"Inf Sci"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1728-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1728-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1728-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T14:12:06Z","timestamp":1566828726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1728-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,12]]},"references-count":27,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["1728"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1728-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2015,6,12]]}}}