{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:02:56Z","timestamp":1758272576720,"version":"3.37.3"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T00:00:00Z","timestamp":1655164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T00:00:00Z","timestamp":1655164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2019R1A2C1088676"],"award-info":[{"award-number":["NRF-2019R1A2C1088676"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10623-022-01063-x","type":"journal-article","created":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T10:21:26Z","timestamp":1655202086000},"page":"2967-2989","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein\u2013Jacobi integers and Lipschitz integers"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0517-9359","authenticated-orcid":false,"given":"Jon-Lark","family":"Kim","sequence":"first","affiliation":[]},{"given":"JunYong","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,14]]},"reference":[{"key":"1063_CR1","volume-title":"Digital Watermarking and Steganography","author":"IJ Cox","year":"2008","unstructured":"Cox I.J., Miller M.L., Bloom J.A., Fridrich J., Kalker T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008)."},{"key":"1063_CR2","unstructured":"Crandall R.: Some notes on steganography (1998)."},{"issue":"6","key":"1063_CR3","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1049\/el:19960340","volume":"32","author":"C de Almeida","year":"1996","unstructured":"de Almeida C., Palazzo R. Jr.: Efficient two-dimensional interleaving technique by use of the set partitioning concept. IEE Electron. Lett. 32(6), 538\u2013540 (1996).","journal-title":"IEE Electron. Lett."},{"key":"1063_CR4","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/TIT.2007.892768","volume":"53","author":"J Fridrich","year":"2007","unstructured":"Fridrich J., Linsonek P.: Grid colorings in steganography. IEEE Trans. Inf. Thoery 53, 1547\u20131549 (2007).","journal-title":"IEEE Trans. Inf. Thoery"},{"key":"1063_CR5","doi-asserted-by":"publisher","first-page":"2361","DOI":"10.1007\/s10623-019-00624-x","volume":"87","author":"J-L Kim","year":"2019","unstructured":"Kim J.-L., Park J., Choi S.: Steganographic schemes from perfect codes on Cayley graphs. Des. Codes Cryptogr. 87, 2361\u20132374 (2019).","journal-title":"Des. Codes Cryptogr."},{"key":"1063_CR6","doi-asserted-by":"publisher","first-page":"3042","DOI":"10.1109\/TIT.2007.903126","volume":"53","author":"C Mart\u00ednez","year":"2007","unstructured":"Mart\u00ednez C., Beivide R., Gabidulin E.M.: Perfect codes for metrics induced by circulant graphs. IEEE Trans. Inf. Thoery 53, 3042\u20133052 (2007).","journal-title":"IEEE Trans. Inf. Thoery"},{"key":"1063_CR7","doi-asserted-by":"publisher","first-page":"3552","DOI":"10.1109\/TIT.2009.2023733","volume":"55","author":"C Mart\u00ednez","year":"2009","unstructured":"Mart\u00ednez C., Beivide R., Gabidulin E.M.: Perfect codes from Cayley graphs over Lipschitz integers. IEEE Trans. Inf. Thoery 55, 3552\u20133562 (2009).","journal-title":"IEEE Trans. Inf. Thoery"},{"key":"1063_CR8","first-page":"83","volume-title":"Algebraic Geometry Modelling in Information Theory","author":"C Munuera","year":"2012","unstructured":"Munuera C.: Steganography from a coding theory point of view in the book. In: Martinez-Moro E. (ed.) Algebraic Geometry Modelling in Information Theory, pp. 83\u2013128. World Scientific, Singapore (2012)."},{"issue":"1","key":"1063_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MCAS.2004.1286985","volume":"4","author":"YQ Shi","year":"2004","unstructured":"Shi Y.Q., Zhang X.M., Ni Z.-C., Ansari N.: Interleaving for combating bursts of errors. IEEE Circuits Syst. Mag. 4(1), 29\u201342 (2004).","journal-title":"IEEE Circuits Syst. Mag."},{"key":"1063_CR10","unstructured":"Trithemius J.: Steganographia, Germany (1499). https:\/\/en.wikipedia.org\/wiki\/Steganographia."},{"key":"1063_CR11","doi-asserted-by":"crossref","unstructured":"Westfeld A.: F5_ a steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of 4th Int\u2019l Information Hiding Workshop, vol. 2137, pp. 289\u2013302. Springer, Berlin (2001).","DOI":"10.1007\/3-540-45496-9_21"},{"issue":"1","key":"1063_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10623-007-9135-9","volume":"46","author":"W Zhang","year":"2008","unstructured":"Zhang W., Li S.: A coding problem in steganography. Des. Codes Cryptogr. 46(1), 67\u201381 (2008).","journal-title":"Des. Codes Cryptogr."},{"key":"1063_CR13","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.jpaa.2018.05.007","volume":"223","author":"S Zhou","year":"2019","unstructured":"Zhou S.: Cyclotomic graphs and perfect codes. J. Pure Appl. Algebra 223, 931\u2013947 (2019).","journal-title":"J. Pure Appl. Algebra"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01063-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01063-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01063-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T08:09:33Z","timestamp":1668154173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01063-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,14]]},"references-count":13,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["1063"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01063-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2022,6,14]]},"assertion":[{"value":"29 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}