{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T04:24:25Z","timestamp":1765772665665},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2010,8,5]],"date-time":"2010-08-05T00:00:00Z","timestamp":1280966400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/s10207-010-0112-3","type":"journal-article","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T01:21:01Z","timestamp":1280884861000},"page":"337-352","source":"Crossref","is-referenced-by-count":38,"title":["Using contourlet transform and cover selection for secure steganography"],"prefix":"10.1007","volume":"9","author":[{"given":"Hedieh","family":"Sajedi","sequence":"first","affiliation":[]},{"given":"Mansour","family":"Jamzad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,5]]},"reference":[{"key":"112_CR1","doi-asserted-by":"crossref","unstructured":"Raja, K.B., Chowdary, C.R., Venugopal, K.R., Patnaik, L.M.: A secure image steganography using LSB, DCT and compression techniques on raw images. In: Proceeding of 3rd International Conference of Intelligent Sensing and Information, pp. 170\u2013176 (2005)","DOI":"10.1109\/ICISIP.2005.1619431"},{"key":"112_CR2","unstructured":"Martin, A., Sapiro, G., Seroussi, G.: Is image steganography natural? Technical Report. Information Theory Research Group, HP Laboratories Palo Alto (2004)"},{"key":"112_CR3","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5-a steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of 4th International Workshop on Information Hiding (2001)","DOI":"10.1007\/3-540-45496-9_21"},{"key":"112_CR4","doi-asserted-by":"crossref","unstructured":"Sallee, P.: Model-based steganography. In: Proceedings of International Workshop on Digital Watermarking, Korea (2003)","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"112_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proceedings of ACM Multimedia Workshop, Germany (2004)","DOI":"10.1145\/1022431.1022435"},{"key":"112_CR6","doi-asserted-by":"crossref","unstructured":"Sarkar, A., Solanki, K., Manjunath, B.S.: Further study on YASS: steganography based on randomized embedding to resist blind steganalysis. In: Proceedings of SPIE, vol. 6819, pp. 681917\u2013681917-11 (2008)","DOI":"10.1117\/12.767893"},{"key":"112_CR7","doi-asserted-by":"crossref","unstructured":"Raja, K.B., Vikas, Venugopal, K.R., Patnaik, L.M.: High capacity lossless secure image steganography using wavelets. In: Proceeding of International Conference on Advanced Computing and Communications, pp. 230\u2013235 (2006)","DOI":"10.1109\/ADCOM.2006.4289889"},{"issue":"3","key":"112_CR8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"7","author":"C.K. Chan","year":"2004","unstructured":"Chan C.K., Cheng L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 7(3), 469\u2013474 (2004)","journal-title":"Pattern Recognit."},{"key":"112_CR9","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of the Workshop on Multimedia and Security (2007)","DOI":"10.1145\/1288869.1288872"},{"key":"112_CR10","doi-asserted-by":"crossref","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Proceedings of 3rd International Workshop Information Hiding (2000)","DOI":"10.1007\/10719724_5"},{"key":"112_CR11","doi-asserted-by":"crossref","unstructured":"Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: yet another steganographic scheme that resists blind steganalysis. In: Proceedings of 9th International Workshop on Information Hiding (2007)","DOI":"10.1007\/978-3-540-77370-2_2"},{"key":"112_CR12","doi-asserted-by":"crossref","unstructured":"Li, B., Shi, Y.Q., Huang, J.: Steganalysis of YASS. In: Proceedings of ACM MM&Sec\u201908 (2008)","DOI":"10.1145\/1411328.1411354"},{"issue":"3","key":"112_CR13","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1016\/S1004-4132(07)60139-X","volume":"18","author":"K. Zhiwei","year":"2007","unstructured":"Zhiwei K., Jing L., Yigang H.: Steganography based on wavelet transform and modulus function. J. Syst. Eng. Electron. 18(3), 628\u2013632 (2007)","journal-title":"J. Syst. Eng. Electron."},{"key":"112_CR14","doi-asserted-by":"crossref","unstructured":"Sajedi, H., Jamzad, M.: Adaptive steganography method based on contourlet transform. In: Proceedings of 9th International Conference on Signal Processing (2008)","DOI":"10.1109\/ICOSP.2008.4697237"},{"issue":"12","key":"112_CR15","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/TIP.2005.859376","volume":"14","author":"M.N. Do","year":"2005","unstructured":"Do M.N., Vetterli M.: The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans. Image Process. 14(12), 2091\u20132106 (2005)","journal-title":"IEEE Trans. Image Process."},{"key":"112_CR16","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H., Memon, N.: Cover selection for steganograpic embedding. In: Proceedings of ICIP, pp. 117\u2013121 (2006)","DOI":"10.1109\/ICIP.2006.312386"},{"key":"112_CR17","doi-asserted-by":"crossref","unstructured":"Watson, B.A.: DCT quantization matrices visually optimized for individual images, human vision, visual processing and digital display IV. In: Proceedings of SPIE, vol. 1913, pp. 202\u2013216 (2005)","DOI":"10.1117\/12.152694"},{"issue":"4","key":"112_CR18","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Wang Z., Bovik A., Sheikh H., Simoncelli E.: Perceptual image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"112_CR19","doi-asserted-by":"crossref","unstructured":"Kermani, Z.Z., Jamzad, M.: A robust steganography algorithm based on texture similarity using gabor filter. In: Proceedings of IEEE International Symposium Signal processing and Information Technology, pp. 578\u2013582 (2005)","DOI":"10.1109\/ISSPIT.2005.1577161"},{"key":"112_CR20","unstructured":"Sajedi, H., Jamzad, M.: Cover selection steganography method based on similarity of image blocks. In: Proceedings of IEEE 8th CIT Conference, Sydney, Australia (2008)"},{"key":"112_CR21","doi-asserted-by":"crossref","unstructured":"Do, M., Vetterli, M.: Contourlets: a directional multiresolution image representation. In: Proceedings of IEEE International Conference on Image Processing, vol. 1, pp. 357\u2013360 (2002)","DOI":"10.1109\/ICIP.2002.1038034"},{"key":"112_CR22","unstructured":"Po, D.D.-Y.: Image modeling in contourlet domain, master\u2019s thesis. University of Illinois, Urbana-Champaign (2003)"},{"key":"112_CR23","doi-asserted-by":"crossref","unstructured":"Po, D.D.-Y., Do, M.N.: Directional multiscale modeling of images using the contourlet transform. In: Proceedings of IEEE Workshop on Statistical Signal Processing, pp. 262\u2013265 (2003)","DOI":"10.1109\/SSP.2003.1289394"},{"issue":"4","key":"112_CR24","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1109\/TMM.2002.802019","volume":"4","author":"M.N. Do","year":"2002","unstructured":"Do M.N., Vetterli M.: Rotation invariant texture characterization and retrieval using steerable wavelet-domain hidden markov models. IEEE Trans. Multimed. 4(4), 517\u2013527 (2002)","journal-title":"IEEE Trans. Multimed."},{"key":"112_CR25","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Proceedings of 6th Information Hiding Workshop, Toronto (2004)","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"112_CR26","doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Proceedings of 5th International Workshop on Information Hiding (2002)","DOI":"10.1007\/3-540-36415-3_22"},{"key":"112_CR27","doi-asserted-by":"crossref","unstructured":"Pevny, T., Fridrich, J.: Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, San Jose, CA (2007)","DOI":"10.1117\/12.696774"},{"key":"112_CR28","doi-asserted-by":"crossref","unstructured":"Chen, C., Shi, Y.Q., Chen, W., Xuan, G.: Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function. In: Proceedings of ICIP, pp. 105\u2013108 (2006)","DOI":"10.1109\/ICIP.2006.312383"},{"issue":"1","key":"112_CR29","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TIFS.2006.890517","volume":"2","author":"Y. Wang","year":"2007","unstructured":"Wang Y., Moulin P.: Optimized feature extraction for learning-based image steganalysis. IEEE Trans. Inf. Forensics Secur. 2(1), 31\u201345 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"112_CR30","doi-asserted-by":"crossref","unstructured":"Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Yang, C., Zhang, Z., Chai, P., Chen, C., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Proceeding of 7th International Workshop on Information Hiding (2005)","DOI":"10.1007\/11558859_20"},{"key":"112_CR31","doi-asserted-by":"crossref","unstructured":"Niimi, M., Noda, H., Kawaguchi, E.: An image embedding in image by a complexity based region segmentation method. In: Proceedings of International Conference on Image Processing, pp. 112\u2013119 (1997)","DOI":"10.1109\/ICIP.1997.631986"},{"issue":"4","key":"112_CR32","first-page":"404","volume":"13","author":"M. Jamzad","year":"2006","unstructured":"Jamzad M., Yaghmaee F.: Achieving higher stability in watermarking according to image complexity. Sci. Iran. J. 13(4), 404\u2013412 (2006)","journal-title":"Sci. Iran. J."},{"key":"112_CR33","unstructured":"Haller, R.S.: Complexity of real images evaluated by densitometric analysis and by psychophysical scaling. M.Sc. Thesis, University of Arizona (1970)"},{"key":"112_CR34","unstructured":"Seong, Y.K., Choi, Y.H., Choi, T.S.: Scene-based watermarking method for copy protection using image complexity and motion vector amplitude. In: Proceedings of ICASSP, pp. III-409-412 (2004)"},{"issue":"3","key":"112_CR35","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1145\/1141911.1141935","volume":"25","author":"S. Bae","year":"2006","unstructured":"Bae S., Paris S., Durand F.: Two-scale tone management for photographic look. ACM Trans. Graph. 25(3), 637\u2013645 (2006)","journal-title":"ACM Trans. Graph."},{"key":"112_CR36","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, G.: Detecting LSB steganography in color and gray-scale images. In: Proceedings of Workshop on Multimedia and security, pp. 27\u201330 (2001)","DOI":"10.1109\/93.959097"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0112-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-010-0112-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0112-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:34:02Z","timestamp":1559370842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-010-0112-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,5]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["112"],"URL":"https:\/\/doi.org\/10.1007\/s10207-010-0112-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,5]]}}}