{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T03:53:13Z","timestamp":1678074793157},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2014,3,8]],"date-time":"2014-03-08T00:00:00Z","timestamp":1394236800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11042-014-1921-6","type":"journal-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T08:40:57Z","timestamp":1394181657000},"page":"6657-6670","source":"Crossref","is-referenced-by-count":3,"title":["Reducing the embedding impact in steganography using Hamiltonian paths and writing on wet paper"],"prefix":"10.1007","volume":"74","author":[{"given":"Mehran","family":"Iranpour","sequence":"first","affiliation":[]},{"given":"Reza","family":"Safabakhsh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"issue":"1","key":"1921_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/1.3554413","volume":"20","author":"H Amirkhani","year":"2011","unstructured":"Amirkhani H, Rahmati M (2011) New framework for using image contents in blind steganalysis systems. J Electron Imaging 20(1):1\u201314","journal-title":"J Electron Imaging"},{"key":"1921_CR2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.ins.2012.01.010","volume":"193","author":"R Amirtharajan","year":"2012","unstructured":"Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115\u2013124","journal-title":"Inf Sci"},{"key":"1921_CR3","doi-asserted-by":"crossref","first-page":"49","DOI":"10.3233\/FI-2009-166","volume":"96","author":"CS Chan","year":"2010","unstructured":"Chan CS (2010) On using LSB matching function for data hiding in pixels. Fundamenta Informaticae 96:49\u201359","journal-title":"Fundamenta Informaticae"},{"issue":"3","key":"1921_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol 2(3):1\u201327, software available at: http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm","journal-title":"ACM Trans Intell Syst Technol"},{"key":"1921_CR5","unstructured":"Chao RM, Wu HC, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Security: 1\u20139, Article ID 658047"},{"key":"1921_CR6","doi-asserted-by":"crossref","first-page":"1724","DOI":"10.1016\/j.sigpro.2013.01.014","volume":"93","author":"R Cogranne","year":"2013","unstructured":"Cogranne R, Retraint F (2013) Application of hypothesis testing theory for optimal detection of LSB matching data hiding. Signal Process 93:1724\u20131737","journal-title":"Signal Process"},{"key":"1921_CR7","volume-title":"Graph theory","author":"R Diestel","year":"2000","unstructured":"Diestel R (2000) Graph theory, 2nd edn. Springer, New York","edition":"2"},{"issue":"4","key":"1921_CR8","doi-asserted-by":"crossref","DOI":"10.1117\/1.JEI.22.4.043007","volume":"22","author":"M Fakhredanesh","year":"2013","unstructured":"Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlet transform. J Electron Imaging 22(4), 043007","journal-title":"J Electron Imaging"},{"key":"1921_CR9","unstructured":"Filler T, Fridrich J (2009) Fisher information determines capacity of epsilon-secure steganography. Proc. 11th International Hiding Workshop, Lecture Notes in Computer Science, vol. 5806, Darmstadt, Germany, pp 31\u201347"},{"key":"1921_CR10","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2010","unstructured":"Fridrich J (2010) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, New York"},{"key":"1921_CR11","doi-asserted-by":"crossref","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J Fridrich","year":"2005","unstructured":"Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53:3923\u20133935","journal-title":"IEEE Trans Signal Process"},{"issue":"1","key":"1921_CR12","doi-asserted-by":"crossref","first-page":"013022","DOI":"10.1117\/1.JEI.21.1.013022","volume":"21","author":"K Ghazanfari","year":"2012","unstructured":"Ghazanfari K, Safabakhsh R (2012) Adaptive method for hiding data in images. J Electron Imaging 21(1):013022","journal-title":"J Electron Imaging"},{"key":"1921_CR13","volume-title":"Digital image processing","author":"R Gonzalez","year":"2008","unstructured":"Gonzalez R, Woods R (2008) Digital image processing, 3rd edn. Prentice Hall, United States of America","edition":"3"},{"issue":"1","key":"1921_CR14","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensic Secur 7(1):176\u2013184","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1921_CR15","unstructured":"Hsu CW, Chang CC, Lin CJ (2010) A practical guide to support vector classification. Dept. of Computer Science, National Taiwan University, Taiwan"},{"key":"1921_CR16","unstructured":"Iranpour M (2013) Adaptive edge tracing steganography. Proc. 55th IEEE International Symposium ELMAR-2013, Zadar, Croatia, pp 27\u201330"},{"key":"1921_CR17","doi-asserted-by":"crossref","unstructured":"Iranpour M (2013) A novel steganographic method based on edge detection and adaptive multiple bits substitution. Proc. 18th IEEE International Conference on Digital Signal Processing (DSP\u201913), Santorini, Greece, pp 1\u20136","DOI":"10.1109\/ICDSP.2013.6622828"},{"key":"1921_CR18","doi-asserted-by":"crossref","unstructured":"Iranpour M (2013) LSB-based steganography using Hamiltonian paths. Proc. 9th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP\u201913), Beijing, China","DOI":"10.1109\/IIH-MSP.2013.151"},{"key":"1921_CR19","doi-asserted-by":"crossref","unstructured":"Iranpour M, Farokhian F (2013) Minimal distortion steganography using well-defined functions, Proc. 10th IEEE International Conference HONET-Communications & Network Security (HONET-CNS 2013), Magosa, Cyprus, pp 21\u201324","DOI":"10.1109\/HONET.2013.6729751"},{"key":"1921_CR20","doi-asserted-by":"crossref","unstructured":"Iranpour M, Rahmati M (2013) A novel block-based steganographic method. Proc. 3rd IEEE International eConference on Computer and Knowledge Engineering (ICCKE 2013), Mashhad, Iran, pp 167\u2013172","DOI":"10.1109\/ICCKE.2013.6682811"},{"key":"1921_CR21","doi-asserted-by":"crossref","unstructured":"Izadinia H, Sadeghi F, Rahmati M (2009) A new secure steganographic method based on predictive coding and quantization index modulation. Proc. Int. Conf. of Soft Computing and Pattern Recognition (SoCPaR\u201909), Malacca, Malaysia, pp 234\u2013238","DOI":"10.1109\/SoCPaR.2009.55"},{"key":"1921_CR22","unstructured":"Jung KH, Yoo KY (2012) Data hiding using edge detector for scalable images. Multimed Tools Appl 1\u201314"},{"issue":"6","key":"1921_CR23","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"AD Ker","year":"2005","unstructured":"Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441\u2013444","journal-title":"IEEE Signal Process Lett"},{"key":"1921_CR24","unstructured":"Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. Proc. SPIE, EI, Security, Forensics, Steganography, Watermarking of Multimedia Contents X, vol. 6819, San Jose, CA, pp 1\u201317"},{"key":"1921_CR25","unstructured":"Kim C (2012) Data hiding by an improved exploiting modification direction. Multimed Tools Appl 1\u201316"},{"key":"1921_CR26","unstructured":"Kuhn M (2010) JBIG-KIT. http:\/\/www.cl.cam.ac.uk\/\u223cmgk25\/jbigkit\/ . Accessed 20 May 2013"},{"issue":"2","key":"1921_CR27","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/LSP.2008.2008947","volume":"16","author":"X Li","year":"2009","unstructured":"Li X, Yang B, Cheng D, Zeng T (2009) A generalization of LSB matching. IEEE Sig Process Lett 16(2):69\u201372","journal-title":"IEEE Sig Process Lett"},{"key":"1921_CR28","doi-asserted-by":"crossref","unstructured":"Li X, Zeng T, Yang B (2008) Improvement of the embedding efficiency of LSB matching by sum and difference covering set. Proc. IEEE International Conference on Multimedia and Expo (ICME), Germany, pp 209\u2013212","DOI":"10.1109\/ICME.2008.4607408"},{"key":"1921_CR29","volume-title":"Finite fields","author":"R Lidl","year":"1997","unstructured":"Lidl R, Niederreiter H (1997) Finite fields, 2nd edn. Cambridge University Press, Cambridge","edition":"2"},{"issue":"5","key":"1921_CR30","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TMM.2010.2051243","volume":"12","author":"GS Lin","year":"2010","unstructured":"Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans Multimedia 12(5):345\u2013357","journal-title":"IEEE Trans Multimedia"},{"key":"1921_CR31","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11042-009-0440-3","volume":"52","author":"W Luo","year":"2011","unstructured":"Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52:407\u2013430","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"1921_CR32","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Sig Process Lett 13(5):285\u2013287","journal-title":"IEEE Sig Process Lett"},{"issue":"2","key":"1921_CR33","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11042-010-0517-z","volume":"54","author":"M Omoomi","year":"2011","unstructured":"Omoomi M, Samavi S, Dumitrescu S (2011) An efficient high payload \u00b11 data embedding scheme. Multimed Tools Appl 54(2):201\u2013218","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"1921_CR34","doi-asserted-by":"crossref","DOI":"10.1117\/1.JEI.22.4.043009","volume":"22","author":"K Qazanfari","year":"2013","unstructured":"Qazanfari K, Safabakhsh R (2013) High-capacity method for hiding data in the discrete cosine transform domain. J Electron Imaging 22(4), 043009","journal-title":"J Electron Imaging"},{"issue":"3","key":"1921_CR35","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1007\/s11042-011-0975-y","volume":"64","author":"V Sabeti","year":"2013","unstructured":"Sabeti V, Samavi S, Shirani S (2013) An adaptive LSB matching steganography based on octonary complexity measure. Multimed Tools Appl 64(3):777\u2013793","journal-title":"Multimed Tools Appl"},{"key":"1921_CR36","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0871-6","volume-title":"Space-filling curves","author":"H Sagan","year":"1994","unstructured":"Sagan H (1994) Space-filling curves. Springer-Verlag, New York"},{"key":"1921_CR37","unstructured":"Schaefer G, Stich M (2004) UCID - An Uncompressed Color Image Database. Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, pp 472\u2013480 (available at: http:\/\/homepages.lboro.ac.uk\/~cogs\/datasets\/ucid\/ucid.html )"},{"key":"1921_CR38","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-45496-9_2","volume":"2137","author":"T Sharp","year":"2001","unstructured":"Sharp T (2001) An implementation of key-based digital signal steganography. Proc Inf Hiding Workshop 2137:13\u201326","journal-title":"Proc Inf Hiding Workshop"},{"key":"1921_CR39","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"VN Vapnik","year":"1995","unstructured":"Vapnik VN (1995) The nature of statistical learning theory. Springer-Verlag, New York"},{"key":"1921_CR40","doi-asserted-by":"crossref","first-page":"1525","DOI":"10.1016\/j.sigpro.2011.12.013","volume":"92","author":"XT Wang","year":"2012","unstructured":"Wang XT, Chang CC, Lin CC, Li MC (2012) A novel multi-group exploiting modification direction method based on switch map. Signal Process 92:1525\u20131535","journal-title":"Signal Process"},{"key":"1921_CR41","unstructured":"Westfeld A, BOWS2 image database. http:\/\/dud.inf.tu-dresden.de\/~westfeld\/rsp\/rsp.html . Accessed 20 May 2013"},{"issue":"8","key":"1921_CR42","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1016\/j.ins.2009.12.027","volume":"180","author":"H Xu","year":"2010","unstructured":"Xu H, Wanga J, Kim HJ (2010) Near-optimal solution to pair-wise LSB matching via an immune programming strategy. Inf Sci 180(8):1201\u20131217","journal-title":"Inf Sci"},{"issue":"3","key":"1921_CR43","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","volume":"3","author":"CH Yang","year":"2008","unstructured":"Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensic Secur 3(3):488\u2013497","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"11","key":"1921_CR44","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Comm Lett 10(11):781\u2013783","journal-title":"IEEE Comm Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1921-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-1921-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1921-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,16]],"date-time":"2020-08-16T02:53:21Z","timestamp":1597546401000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-1921-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,8]]},"references-count":44,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["1921"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-1921-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,8]]}}}