{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:26:05Z","timestamp":1762781165870},"reference-count":17,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2002,10,1]],"date-time":"2002-10-01T00:00:00Z","timestamp":1033430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,10]]},"DOI":"10.1016\/s0167-4048(02)00515-1","type":"journal-article","created":{"date-parts":[[2002,9,17]],"date-time":"2002-09-17T16:34:42Z","timestamp":1032280482000},"page":"449-460","source":"Crossref","is-referenced-by-count":41,"title":["Steganographic Method for Secure Communications"],"prefix":"10.1016","volume":"21","author":[{"given":"Der-Chyuan","family":"Lou","sequence":"first","affiliation":[]},{"given":"Jiang-Lung","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)00515-1_BIB1","unstructured":"W. Stallings, Cryptography and Network Security: Principles and Practice, New Jersey: Prentice-Hall, 1999."},{"key":"10.1016\/S0167-4048(02)00515-1_BIB2","unstructured":"D.-C. Lou and C.-H. Sung, \u201dA steganographic scheme for secure communication based on chaos and Euler theorem,\u201d submitted to IEEE Transactions on Multimedia, Aug. 1, 2000. (Revised, No: MM10288)"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB3","doi-asserted-by":"crossref","unstructured":"D.-C. Lou and J.-L. Liu, \u201dFault resilient and compression tolerant digital signature for image authentication,\u201d IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31\u201339, Feb. 2000.","DOI":"10.1109\/30.826378"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB4","unstructured":"C.-T. Li, D.-C. Lou, and J.-L. Liu, \u201dImage integrity and authenticity verification via content-based watermarks and a public key cryptosystem,\u201d to appear in Journal of the Chinese Institute of Electrical Engineering. (No: IN-01-007)"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB5","unstructured":"D.-C. Lou and T.-L. Yin, \u201dAdaptive digital watermarking using fuzzy clustering technique,\u201d IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, vol. E84-A, no. 8, pp. 2052\u20132060, Aug. 2001."},{"key":"10.1016\/S0167-4048(02)00515-1_BIB6","doi-asserted-by":"crossref","unstructured":"F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, \u201dInformation hiding-a survey,\u201d Proceedings of the IEEE, vol. 87, no. 7, pp. 1062\u20131077, July 1999.","DOI":"10.1109\/5.771065"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB7","doi-asserted-by":"crossref","unstructured":"B Pfitzmann, \u201dInformation hiding terminology,\u201d Proceedings of the first workshop on Information hiding, June 1996, pp. 347\u2013350.","DOI":"10.1007\/3-540-61996-8_52"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB8","unstructured":"D.-C. Lou and J.-L. Liu, \u201dCommon-cover-carrier attack on LSB-based steganographic methods,\u201d submitted."},{"key":"10.1016\/S0167-4048(02)00515-1_BIB9","doi-asserted-by":"crossref","unstructured":"W. Bender, D. Gruhl, N. Morimoto, and A. Lu, \u201dTechniques for data hiding,\u201d IBM Systems Journal, vol. 35, nos. 3 and 4, 1996, pp. 313\u2013336.","DOI":"10.1147\/sj.353.0313"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB10","doi-asserted-by":"crossref","unstructured":"N. F. Johnson and S. Jajodia, \u201dExploring steganography: seeing the unseen,\u201d IEEE Computer Magazine, vol. 31, no. 2, Feb. 1998, pp. 26\u201334.","DOI":"10.1109\/MC.1998.4655281"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB11","unstructured":"S. Walton, \u201dImage authentication for a slippery new age,\u201d Dr. Dobb's Journal, vol. 20, no. 4, Apr. 1995, pp. 18\u201326."},{"key":"10.1016\/S0167-4048(02)00515-1_BIB12","unstructured":"W.-N. Lie and L.-C. Chang, \u201dData hiding in images with adaptive numbers of least significant bits based on the human visual system,\u201d Proceedings of the 1999 International Conference on Image Processing, Dec. 1999, vol. 1, pp. 286\u2013290."},{"key":"10.1016\/S0167-4048(02)00515-1_BIB13","doi-asserted-by":"crossref","unstructured":"Y.-K. Lee and L.-H. Chen, \u201dHigh capacity steganographic model,\u201d IEE Proceedings-Vision, Image and Signal Processing, June 2000, vol. 147, no. 3, pp. 288\u2013294.","DOI":"10.1049\/ip-vis:20000341"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB14","doi-asserted-by":"crossref","unstructured":"E. A. Lee and D. G. Messerschmitt, Digital Communications, Boston: Kluwer Academic, 1988.","DOI":"10.1007\/978-1-4684-0044-1"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB15","doi-asserted-by":"crossref","unstructured":"G. K. Wallance, \u201dThe JPEG still picture compression standard,\u201d Communications of the ACM, vol. 34, Apr. 1991, pp. 30\u201334.","DOI":"10.1145\/103085.103089"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB16","doi-asserted-by":"crossref","unstructured":"S. W. Kim, S. Suthaharan, H. K. Lee and K. R. Rao, \u201dImage watermarking scheme using visual model and BN distribution,\u201d Electronics Letters, vol. 35, no. 3, Feb. 1999, pp. 212\u2013214.","DOI":"10.1049\/el:19990172"},{"key":"10.1016\/S0167-4048(02)00515-1_BIB17","unstructured":"http:\/\/www.mathworks.com"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802005151?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802005151?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T14:11:27Z","timestamp":1583590287000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802005151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,10]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2002,10]]}},"alternative-id":["S0167404802005151"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)00515-1","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2002,10]]}}}