{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:22:34Z","timestamp":1773246154539,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,1,12]],"date-time":"2012-01-12T00:00:00Z","timestamp":1326326400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11042-011-0975-y","type":"journal-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T11:43:35Z","timestamp":1326282215000},"page":"777-793","source":"Crossref","is-referenced-by-count":23,"title":["An adaptive LSB matching steganography based on octonary complexity measure"],"prefix":"10.1007","volume":"64","author":[{"given":"Vajiheh","family":"Sabeti","sequence":"first","affiliation":[]},{"given":"Shadrokh","family":"Samavi","sequence":"additional","affiliation":[]},{"given":"Shahram","family":"Shirani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,12]]},"reference":[{"key":"975_CR1","unstructured":"Cancelli G, Cox IJ, Doerr G (2008) Improved LSB matching steganalysis based on the amplitude of local extrema, in IEEE International Conference on Image Processing, October"},{"key":"975_CR2","doi-asserted-by":"crossref","unstructured":"Cancelli G, Doerr G, Cox IJ, Barni M (2008) A comparative study of +1 steganalyzers, IEEE Int. Workshop. on Multimedia Signal Processing, IEEE Workshop on Multimedia Signal Processing, (MMSP)","DOI":"10.1109\/MMSP.2008.4665182"},{"key":"975_CR3","unstructured":"Chang CC, Tseng HW (2004) A Steganographic method for digital images using side match. Pattern Recogn Lett pp. 1431\u20131437"},{"key":"975_CR4","unstructured":"Chen P, Wu W (2009) A Modified Side Match Scheme for Image Steganograph. International Journal of Applied Science and Engineering, pp. 53\u201360"},{"issue":"7","key":"975_CR5","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S Dumitrescu","year":"2003","unstructured":"Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB Steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995\u20132007","journal-title":"IEEE Trans Signal Process"},{"key":"975_CR6","unstructured":"Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In Security, Steganography, and Watermarking of Multimedia Contents VIII, ser. Proceedings of SPIE, Vvol. 6072, pp. 607 201\u20131"},{"key":"975_CR7","unstructured":"Harmsen JJ, Pearlman WA (2003) Steganalysis of Additive Noise Modelable Information Hiding, Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, Vol. 5020, pp. 131\u2013142"},{"key":"975_CR8","first-page":"401","volume":"1","author":"F Huang","year":"2007","unstructured":"Huang F, Li B, Huang J (2007) Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels. Proc IEEE ICIP 1:401\u2013404","journal-title":"Proc IEEE ICIP"},{"issue":"6","key":"975_CR9","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"AD Ker","year":"2005","unstructured":"Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441\u2013444","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"975_CR10","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/LSP.2008.2008947","volume":"16","author":"X Li","year":"2009","unstructured":"Li X, Yang B, Cheng D, Zeng T (2009) A generalization of LSB matching. IEEE Signal Process Lett 16(2):69\u201372","journal-title":"IEEE Signal Process Lett"},{"key":"975_CR11","unstructured":"Liu TC, Huang CC (2007) Lossless Information Hiding Scheme Based on Pixels Complexity Analysis, Proceedings of Third International Conference on Signal Image Technology & Internet-based Systems (SITIS 2007), Shanghai, China, pp. 934\u2013941"},{"key":"975_CR12","unstructured":"Liu C, Li X, Lu X, Yang B (2009) A content-adaptive approach for reducing embedding impact in steganography. In Proc IEEE ICIP"},{"issue":"2","key":"975_CR13","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inform Forens Sec 5(2):201\u2013214","journal-title":"IEEE Trans Inform Forens Sec"},{"key":"975_CR14","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.patcog.2003.08.010","volume":"37","author":"SS Maniccam","year":"2004","unstructured":"Maniccam SS, Bourbakis N (2004) Lossless compression and information hiding in images. Pattern Recogn 37:475\u2013486","journal-title":"Pattern Recogn"},{"issue":"5","key":"975_CR15","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285\u2013287","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"975_CR16","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11042-010-0517-z","volume":"54","author":"M Omoomi","year":"2010","unstructured":"Omoomi M, Samavi S, Dumitrescu S (2010) An efficient high payload \u00b11 data embedding scheme. J Multimed Tool Appl 54(2):201\u2013218","journal-title":"J Multimed Tool Appl"},{"key":"975_CR17","doi-asserted-by":"crossref","unstructured":"Sabeti V, Samavi S, Mahdavi M, Shirani S (2007) Steganalysis of pixel-value differencing steganographic method. IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 292\u2013295","DOI":"10.1109\/PACRIM.2007.4313232"},{"key":"975_CR18","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/j.patcog.2009.06.006","volume":"43","author":"V Sabeti","year":"2010","unstructured":"Sabeti V, Samavi S, Mahdavi M, Shirani S (2010) Steganalysis and payload estimation of embedding in pixel differences using neural networks. Pattern Recogn 43:405\u2013415","journal-title":"Pattern Recogn"},{"key":"975_CR19","unstructured":"United States Department of Agriculture (2002) Natural resources conservation service photo gallery. [Online]. Available: http:\/\/photogallery.nrcs.usda.gov"},{"key":"975_CR20","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recognit Lett 24:1613\u20131626","journal-title":"Pattern Recognit Lett"},{"issue":"3","key":"975_CR21","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","volume":"3","author":"CH Yang","year":"2008","unstructured":"Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inform Forens Sec 3(3):488\u2013497","journal-title":"IEEE Trans Inform Forens Sec"},{"key":"975_CR22","doi-asserted-by":"crossref","unstructured":"Zhang J, Cox IJ, Doerr G (2007) Steganalysis for LSB matching in images with high-frequency noise. In Proceedings of the IEEE Workshop on Multimedia Signal Processing, pp. 385\u2013388, October","DOI":"10.1109\/MMSP.2007.4412897"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0975-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-011-0975-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0975-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T10:03:56Z","timestamp":1561197836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-011-0975-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,12]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["975"],"URL":"https:\/\/doi.org\/10.1007\/s11042-011-0975-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,12]]}}}