{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T10:27:40Z","timestamp":1683023260663},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2015,3,12]],"date-time":"2015-03-12T00:00:00Z","timestamp":1426118400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s11042-015-2491-y","type":"journal-article","created":{"date-parts":[[2015,3,11]],"date-time":"2015-03-11T08:26:46Z","timestamp":1426062406000},"page":"4559-4575","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Voicing of animated GIF by data hiding"],"prefix":"10.1007","volume":"75","author":[{"given":"Sonia","family":"Djaziri-Larbi","sequence":"first","affiliation":[]},{"given":"Awatef","family":"Zaien","sequence":"additional","affiliation":[]},{"given":"Sylvie","family":"Sevestre-Ghalila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,12]]},"reference":[{"key":"2491_CR1","doi-asserted-by":"crossref","unstructured":"Cazenave F, Quint V, Roisin C (2011) Timesheets. js: when SMIL meets HTML5 and CSS3. In: 11th ACM symposium on Document engineering, New York","DOI":"10.1145\/2034691.2034700"},{"issue":"3","key":"2491_CR2","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Proc 90(3):727\u2013752","journal-title":"Signal Proc"},{"issue":"7","key":"2491_CR3","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1109\/5.771068","volume":"87","author":"IJ Cox","year":"1999","unstructured":"Cox IJ, Miller ML, McKellips AL (1999) Watermarking as communications with side information. Proc. IEEE 87(7):1127\u20131141","journal-title":"Proc. IEEE"},{"key":"2491_CR4","doi-asserted-by":"crossref","unstructured":"Djaziri-Larbi S, Mah\u00e9 G, Marrakchi I, Turki M, Ja\u00efdane M (2011) Doping and witness watermarking for audio processing. In: 7th Int. Workshop on Systems, Signal Process. and their Applications, Algeria","DOI":"10.1109\/WOSSPA.2011.5931503"},{"key":"2491_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich J (1999) A new steganographic method for palette-based images. In: IS&T PICS conference","DOI":"10.1007\/10719724_4"},{"key":"2491_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich J, Rui D (2000) Secure steganographic methods for palette images","DOI":"10.1007\/10719724_4"},{"key":"2491_CR7","unstructured":"Johnson S, et al (2010) Adobe Illustrator CS5 on Demand. Que Publishing"},{"key":"2491_CR8","doi-asserted-by":"crossref","unstructured":"Katzenbeisser S, Petitcolas FAP (eds) (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"2491_CR9","doi-asserted-by":"crossref","unstructured":"Kim S-M, Cheng Z, Yoo K-Y (2009) A new steganography scheme based on an index-color image. In: 6 t h Int. Conf. on Information Technology, Las Vegas","DOI":"10.1109\/ITNG.2009.119"},{"key":"2491_CR10","unstructured":"Kohler E Gifsicle 1.7. Available from http:\/\/www.lcdf.org\/gifsicle"},{"key":"2491_CR11","volume-title":"Motion graphics design and fine art animation: principles and practice","author":"J Krasner","year":"2004","unstructured":"Krasner J (2004) Motion graphics design and fine art animation: principles and practice. Elsevier, New York"},{"key":"2491_CR12","unstructured":"Kwan M (2010) GIFshuffle 2.0. Available from http:\/\/www.darkside.com.au\/gifshuffle\/"},{"key":"2491_CR13","unstructured":"Machado R, Stego E (1997). Available from http:\/\/www.stego.com"},{"key":"2491_CR14","unstructured":"Mantiuk RK, Tomaszewska A, Mantiuk R Comparison of four subjective methods for image quality assessment"},{"key":"2491_CR15","unstructured":"Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: Information Systems Security International Conference (ISSA), pp 1\u201311"},{"key":"2491_CR16","doi-asserted-by":"crossref","unstructured":"Mukherjee D, Chae JJ, Mitra SK (1998) A source and channel coding approach to data hiding with application to hiding speech in video. In: Proceedings International Conference on Image Processing, vol 1. IEEE, pp 348\u2013352","DOI":"10.1109\/ICIP.1998.723494"},{"key":"2491_CR17","unstructured":"Niederst J, Robbins J (2001) Web design in a nutshell: A desktop quick reference. vol 2. O\u2019Reilly Media, Inc."},{"key":"2491_CR18","doi-asserted-by":"crossref","unstructured":"Sagi A, Malah D (2007) Bandwith extension of telephone speech aided by data embedding. Eurasip J Appl Signal Process","DOI":"10.1155\/2007\/64921"},{"key":"2491_CR19","doi-asserted-by":"crossref","unstructured":"Tzeng CH, Yang ZF, Tsai WH (2004) Adaptive data hiding in palette images by color ordering and mapping with security protection. IEEE Trans on Commun 52(5)","DOI":"10.1109\/TCOMM.2004.826379"},{"key":"2491_CR20","unstructured":"Wang X, Yao T, Li C-T (2005) A palette-based image steganographic method using colour quantisation. In: IEEE Int. Conf. on Image Process."},{"key":"2491_CR21","doi-asserted-by":"crossref","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli E P (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Proc 13(4)","DOI":"10.1109\/TIP.2003.819861"},{"key":"2491_CR22","doi-asserted-by":"crossref","unstructured":"Wu H, Wang H (2013) Multibit color-mapping steganography using depth-first search. In: International Symposium on Biometrics and Security Technologies, pp 224\u2013229. IEEE","DOI":"10.1109\/ISBAST.2013.39"},{"key":"2491_CR23","unstructured":"Wu H, Wang H, Zhao Hg, Yu X (2014) Multi-layer assignment steganography using graph-theoretic approach. Multi Tools Appl:1\u201326"},{"key":"2491_CR24","doi-asserted-by":"crossref","unstructured":"Wu MY, Ho YK, Lee JH (2004) An iterative method of palette-based image steganography. Pattern Recogn Lett 25(3)","DOI":"10.1016\/j.patrec.2003.10.013"},{"key":"2491_CR25","unstructured":"Zhang D, Zhang R, Niu Xn, Yang Y (2010) A digital watermarking algorithm for high capacity index image robust to format transformation. In: 3rd International Conference on Computer Science and Information Technology, vol 3, pp 216\u2013220"},{"key":"2491_CR26","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/LSP.2008.2001117","volume":"15","author":"X Zhang","year":"2008","unstructured":"Zhang X, Wang S, Zhou Z (2008) Multibit assignment steganography in palette images. Signal Processing Lett 15:553\u2013556","journal-title":"Signal Processing Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2491-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2491-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2491-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T21:31:04Z","timestamp":1566423064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2491-y"}},"subtitle":["A technique to add sound to the GIF format"],"short-title":[],"issued":{"date-parts":[[2015,3,12]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["2491"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2491-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,12]]}}}