{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:46:29Z","timestamp":1757313989305},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,3,17]],"date-time":"2016-03-17T00:00:00Z","timestamp":1458172800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s11042-016-3398-y","type":"journal-article","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T19:51:37Z","timestamp":1458330697000},"page":"7849-7867","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["A novel method for digital image steganography based on a new three-dimensional chaotic map"],"prefix":"10.1007","volume":"76","author":[{"given":"Ami","family":"Sharif","sequence":"first","affiliation":[]},{"given":"Majid","family":"Mollaeefar","sequence":"additional","affiliation":[]},{"given":"Mahboubeh","family":"Nazari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,17]]},"reference":[{"key":"3398_CR1","doi-asserted-by":"crossref","unstructured":"Alam S, Kumar V, Siddiqui W, Ahmad M (2014) Key dependent image steganography using edge detection. In: Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on. IEEE, pp 85\u201388","DOI":"10.1109\/ACCT.2014.72"},{"key":"3398_CR2","doi-asserted-by":"crossref","unstructured":"Alam S, Kumar V, Siddiqui WA, Ahmad M (2014) Key dependent image steganography using edge detection. In: Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on. IEEE, pp 85\u201388","DOI":"10.1109\/ACCT.2014.72"},{"issue":"4","key":"3398_CR3","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11071-013-1105-3","volume":"75","author":"A Anees","year":"2014","unstructured":"Anees A et al (2014) A technique for digital steganography using chaotic maps. Nonlinear Dyn 75(4):807\u2013816","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"3398_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):1\u201312","journal-title":"J Med Syst"},{"issue":"8","key":"3398_CR5","doi-asserted-by":"crossref","first-page":"3163","DOI":"10.1007\/s11227-015-1434-8","volume":"71","author":"H Arshad","year":"2015","unstructured":"Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J Supercomput 71(8):3163\u20133180","journal-title":"J Supercomput"},{"issue":"1","key":"3398_CR6","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11042-014-2282-x","volume":"75","author":"H Arshad","year":"2016","unstructured":"Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimed Tools Appl 75(1):181\u2013197","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"3398_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0259-6","volume":"39","author":"H Arshad","year":"2015","unstructured":"Arshad H, Teymoori V, Nikooghadam M, Abbassi H (2015) On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J Med Syst 39(8):1\u201310","journal-title":"J Med Syst"},{"issue":"3","key":"3398_CR8","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1007\/s11071-015-1943-2","volume":"80","author":"M Aziz","year":"2015","unstructured":"Aziz M, Tayarani-N MH, Afsar M (2015) A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dyn 80(3):1271\u20131290","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"3398_CR9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.5121\/ijsptm.2014.3102","volume":"3","author":"D Bandyopadhyay","year":"2014","unstructured":"Bandyopadhyay D, Dasgupta K, Mandal JK, Dutta P (2014) A novel secure image steganography method based on chaos theory in spatial domain. Int J Secur Priv Trust Manag (IJSPTM) 3(1):11\u201322","journal-title":"Int J Secur Priv Trust Manag (IJSPTM)"},{"issue":"2","key":"3398_CR10","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1007\/s11042-013-1415-y","volume":"72","author":"M Bilal","year":"2014","unstructured":"Bilal M, Imtiaz S, Abdul W, Ghouzali S, Asif S (2014) Chaos based Zero-steganography algorithm. Multimed Tools Appl 72(2):1073\u20131092","journal-title":"Multimed Tools Appl"},{"key":"3398_CR11","doi-asserted-by":"crossref","unstructured":"Das P, Kar N (2014) A DNA based image steganography using 2D chaotic map. In: Electronics and Communication Systems (ICECS), 2014 International Conference on. IEEE, pp 1\u20135","DOI":"10.1109\/ECS.2014.6892654"},{"issue":"6","key":"3398_CR12","doi-asserted-by":"crossref","first-page":"1898","DOI":"10.1016\/j.cnsns.2013.10.014","volume":"19","author":"M Ghebleh","year":"2014","unstructured":"Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898\u20131907","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"2","key":"3398_CR13","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26\u201334","journal-title":"Computer"},{"key":"3398_CR14","doi-asserted-by":"crossref","unstructured":"Judge J (2001) Steganography: past, present, future. SANS white paper","DOI":"10.2172\/15006450"},{"issue":"8","key":"3398_CR15","doi-asserted-by":"crossref","first-page":"3287","DOI":"10.1016\/j.cnsns.2011.12.012","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Own HS (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287\u20133302","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3398_CR16","unstructured":"Mollaeefar M, Sharif A, Nazari M (2015) A novel encryption scheme for colored image based on high level chaotic maps. Multimedia Tools Appl 1\u201323"},{"key":"3398_CR17","doi-asserted-by":"crossref","unstructured":"Potdar VM, Han S, Chang E (2005) Fingerprinted secret sharing steganography for robustness against image cropping attacks. In: Industrial Informatics, 2005. INDIN\u201905. 2005 3rd IEEE International Conference on. IEEE, pp 717\u2013724","DOI":"10.1109\/INDIN.2005.1560463"},{"issue":"3","key":"3398_CR18","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32\u201344","journal-title":"IEEE Secur Priv"},{"key":"3398_CR19","unstructured":"Provos N, Honeyman P (2001) Detecting steganographic content on the internet. Center for Information Technology Integration"},{"key":"3398_CR20","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.protcy.2013.12.346","volume":"10","author":"R Roy","year":"2013","unstructured":"Roy R, Sarkar A, Changder S (2013) Chaos based edge adaptive image steganography. Procedia Technol 10:138\u2013146","journal-title":"Procedia Technol"},{"key":"3398_CR21","unstructured":"Sabery KM, Yaghoobi M (2008) A simple and robust approach for image hiding using chaotic logistic map. In Advanced Computer Theory and Engineering, 2008. ICACTE\u201908. International Conference on. IEEE, pp 623\u2013627"},{"key":"3398_CR22","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to Persian\/Arabic text steganography. In: Computer and Information Science, 2006 and 2006 1st IEEE\/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse. ICIS-COMSAR 2006. 5th IEEE\/ACIS International Conference on. IEEE, pp 310\u2013315","DOI":"10.1109\/ICIS-COMSAR.2006.10"},{"key":"3398_CR23","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95\u2013113","journal-title":"Comput Sci Rev"},{"issue":"3","key":"3398_CR24","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81\u201384","journal-title":"IEEE Signal Process Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3398-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3398-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3398-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3398-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T18:25:00Z","timestamp":1567707900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3398-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,17]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["3398"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3398-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,17]]}}}