{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T10:01:18Z","timestamp":1685527278773},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T00:00:00Z","timestamp":1484697600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11042-016-4301-6","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T00:01:55Z","timestamp":1484697715000},"page":"1605-1622","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient large payloads ternary matrix embedding"],"prefix":"10.1007","volume":"77","author":[{"given":"Guangyuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jinwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zongming","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,18]]},"reference":[{"key":"4301_CR1","doi-asserted-by":"crossref","unstructured":"Bierbrauer J, Fridrich J (2008) Constructing good covering codes for applications in steganography. In: Transactions on Data Hiding and Multimedia Security III, pp 1\u201322","DOI":"10.1007\/978-3-540-69019-1_1"},{"issue":"1","key":"4301_CR2","first-page":"1","volume":"2009","author":"R Chao","year":"2009","unstructured":"Chao R, Wu H, Lee C, Chu Y (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009(1):1\u20139","journal-title":"EURASIP J Inf Secur"},{"key":"4301_CR3","unstructured":"Crandall R (1998) Some notes on steganography. Steganography mailing list. \n                        http:\/\/dde.binghamton.edu\/download\/Crandall_matrix.pdf"},{"issue":"3","key":"4301_CR4","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920\u2013935","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"4301_CR5","doi-asserted-by":"crossref","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J Fridrich","year":"2005","unstructured":"Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923\u20133935","journal-title":"IEEE Trans Signal Process"},{"issue":"1","key":"4301_CR6","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/TIFS.2005.863487","volume":"1","author":"J Fridrich","year":"2006","unstructured":"Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Inf Forensics Secur 1(1):102\u2013110","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"4301_CR7","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsk\u00fd J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4301_CR8","unstructured":"Fridrich J, Lison\u011bk P, Soukal D (2006) On steganographic embedding efficiency. In: Proceedings of the 8th international workshop on information hiding, pp 282\u2013296"},{"issue":"3","key":"4301_CR9","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"1","author":"J Fridrich","year":"2006","unstructured":"Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Trans Inf Forensics Secur 1(3):390\u2013395","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4301_CR10","doi-asserted-by":"crossref","unstructured":"Gao Y, Li X, Yang B (2009) Employing optimal matrix for efficient matrix embedding. In: Proceedings of the fifth international conference on intelligent information hiding and multimedia signal processing, pp 161\u2013165","DOI":"10.1109\/IIH-MSP.2009.59"},{"key":"4301_CR11","unstructured":"Gao Y, Li X, Zeng T, Yang B (2009) Improving embedding efficiency via matrix embedding: a case study . In: Proceedings of the IEEE international conference on image processing, pp 109\u2013112"},{"key":"4301_CR12","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the ACM information hiding and multimedia security workshop, pp 59\u201368","DOI":"10.1145\/2482513.2482514"},{"issue":"1","key":"4301_CR13","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2012","unstructured":"Hong W, Chen T (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur 7(1):176\u2013184","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"17","key":"4301_CR14","doi-asserted-by":"crossref","first-page":"6657","DOI":"10.1007\/s11042-014-1921-6","volume":"74","author":"M Iranpour","year":"2015","unstructured":"Iranpour M, Safabakhsh R (2015) Reducing the embedding impact in steganography using hamiltonian paths and writing on wet paper. Multimedia Tools and Applications 74(17):6657\u20136670","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"4301_CR15","first-page":"1167","volume":"6","author":"W Kuo","year":"2015","unstructured":"Kuo W, Lai P, Wang C, Wuu L (2015) A formula diamond encoding data hiding scheme. Journal of Information Hiding and Multimedia Signal Processing 6(6):1167\u20131176","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"2","key":"4301_CR16","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.ipl.2015.08.003","volume":"116","author":"W Kuo","year":"2016","unstructured":"Kuo W, Wang C, Hou H (2016) Signed digit data hiding scheme. Inf Process Lett 116(2):183\u2013191","journal-title":"Inf Process Lett"},{"issue":"11","key":"4301_CR17","doi-asserted-by":"crossref","first-page":"1574","DOI":"10.1016\/j.aeue.2015.07.007","volume":"69","author":"W Kuo","year":"2015","unstructured":"Kuo W, Wang C, Huang Y (2015) Binary power data hiding scheme. AEU Int J Electron Commun 69(11):1574\u20131581","journal-title":"AEU Int J Electron Commun"},{"issue":"9","key":"4301_CR18","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1109\/TIFS.2015.2434600","volume":"10","author":"B Li","year":"2015","unstructured":"Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905\u20131917","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4301_CR19","unstructured":"Li J, Yang X, Liao X, Pan F, Zhang M (2016) A game-theoretic method for designing distortion function in spatial steganography. Multimedia Tools and Applications:1\u201315"},{"key":"4301_CR20","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.ins.2015.06.046","volume":"324","author":"X Li","year":"2015","unstructured":"Li X, Cai S, Zhang W, Yang B (2015) A further study of large payloads matrix embedding. Inf Sci 324:257\u2013269","journal-title":"Inf Sci"},{"issue":"9","key":"4301_CR21","doi-asserted-by":"crossref","first-page":"2529","DOI":"10.1016\/j.sigpro.2013.03.029","volume":"93","author":"X Li","year":"2013","unstructured":"Li X, Li B, Luo X, Yang B, Zhu R (2013) Steganalysis of a PVD-based content adaptive image steganography. Signal Process 93(9):2529\u20132538","journal-title":"Signal Process"},{"issue":"2","key":"4301_CR22","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/LSP.2008.2008947","volume":"16","author":"X Li","year":"2009","unstructured":"Li X, Yang B, Cheng D, Zeng T (2009) A generalization of LSB matching. IEEE Signal Process Lett 16(2):69\u201372","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"4301_CR23","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201\u2013214","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"4301_CR24","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB Matching revisited. IEEE Signal Process Lett 13 (5):285\u2013287","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"4301_CR25","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4301_CR26","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th information hiding, pp 161\u2013177","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"4301_CR27","unstructured":"van Dijk M, Willems F (2001) Embedding information in grayscale images. In: Proceedings of the 22nd symposium on information and communication theory in the benelux, pp 147\u2013154"},{"issue":"1","key":"4301_CR28","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TIFS.2011.2164907","volume":"7","author":"C Wang","year":"2012","unstructured":"Wang C, Zhang W, Liu J, Yu N (2012) Fast matrix embedding by matrix extending. IEEE Trans Inf Forensics Secur 7(1):346\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9-10","key":"4301_CR29","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D Wu","year":"2003","unstructured":"Wu D, Tsai W (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9-10):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"4","key":"4301_CR30","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75 (4):1947\u20131962","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"4301_CR31","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","volume":"3","author":"C Yang","year":"2008","unstructured":"Yang C, Weng C, Wang S, Sun H (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488\u2013497","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"4301_CR32","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-4301-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4301-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4301-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,16]],"date-time":"2018-01-16T06:39:25Z","timestamp":1516084765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-4301-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,18]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["4301"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-4301-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,18]]}}}