{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:38:47Z","timestamp":1775018327929,"version":"3.50.1"},"reference-count":35,"publisher":"Pleiades Publishing Ltd","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1134\/s0361768823080224","type":"journal-article","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T09:30:41Z","timestamp":1706088641000},"page":"922-941","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Development of Multi-Platform Steganographic Software Based on Random-LSB"],"prefix":"10.1134","volume":"49","author":[{"given":"Gabor Attila","family":"Tibor","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8188-2425","authenticated-orcid":false,"given":"Jozsef","family":"Katona","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2024,1,24]]},"reference":[{"key":"3798_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., and Lu, A., Techniques for data hiding, IBM Syst. J., 1996, vol. 35, pp. 313\u2013336. https:\/\/doi.org\/10.1147\/sj.353.0313","journal-title":"IBM Syst. J."},{"key":"3798_CR2","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A., Anderson, R.J., and Kuhn, M.G., Information hiding-a survey, Proc. IEEE, 1999, vol. 87, pp. 1062\u20131078. https:\/\/doi.org\/10.1109\/5.771065","journal-title":"Proc. IEEE"},{"key":"3798_CR3","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J. Fridrich","year":"2012","unstructured":"Fridrich, J. and Kodovsky, J., Rich models for steganalysis of digital images, IEEE Trans. Inf. Forensics and Secur., 2012, vol. 7, pp. 868\u2013882.","journal-title":"IEEE Trans. Inf. Forensics and Secur."},{"key":"3798_CR4","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W. Luo","year":"2010","unstructured":"Luo, W., Huang, F., and Huang, J., Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. Inf. Forensics and Secur., 2010, vol. 5, pp.\u00a0201\u2013214.","journal-title":"IEEE Trans. Inf. Forensics and Secur."},{"key":"3798_CR5","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/tsmc.2019.2903785","volume":"50","author":"M. Khari","year":"2019","unstructured":"Khari, M., Garg, A.K., Gandomi, A.H., Gupta, R., Patan, R., and Balusamy, B., Securing data in Internet of Things (IoT) using cryptography and steganography techniques, IEEE Trans. Syst., Man, Cybernet.: Syst., 2019, vol. 50, pp. 73\u201380. https:\/\/doi.org\/10.1109\/tsmc.2019.2903785","journal-title":"IEEE Trans. Syst., Man, Cybernet.: Syst."},{"key":"3798_CR6","doi-asserted-by":"publisher","unstructured":"Li, W., Wang, H., Chen, Y., Abdullahi, S.M., and Luo, J., Constructing immunized stego-image for secure steganography via artificial immune system, IEEE Trans. Multimedia, 2023, pp. 1\u201314. https:\/\/doi.org\/10.1109\/tmm.2023.3234812","DOI":"10.1109\/tmm.2023.3234812"},{"key":"3798_CR7","unstructured":"Goel, S., Rana, A., and Kaur, M., A review of comparison techniques of image steganography, Global J. Comput. Sci. Technol., 2013, vol. 13, no. 4."},{"key":"3798_CR8","unstructured":"James, N.K., Cross-platform targeting for. net libraries, for. NET libraries | Microsoft Learn. \nhttps:\/\/learn.microsoft.com\/en-us\/dotnet\/standard\/library-guidance\/cross-platform-targeting. Accessed 2023\/02\/05."},{"key":"3798_CR9","unstructured":"Conventional commits. https:\/\/www.conventionalcommits.org\/en\/v1.0.0\/. Accessed 2023\/02\/05."},{"key":"3798_CR10","unstructured":"Atlassian, B., Gitflow workflow: Atlassian Git Tutorial, Atlassian. https:\/\/www.atlassian.com\/git\/tutorials\/comparing-workflows\/gitflow-workflow. Accessed 2023\/02\/05."},{"key":"3798_CR11","doi-asserted-by":"publisher","unstructured":"Ganwani, P., Gupta, L., Jain, C., Kulkarni, R., and Chaudhari, S., Lsb based audio steganography using rsa and chacha20 encryption, Proc. 12th Int. Conf. on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, 2021, pp. 1\u20136. https:\/\/doi.org\/10.1109\/icccnt51525.2021.9580177.","DOI":"10.1109\/icccnt51525.2021.9580177"},{"key":"3798_CR12","volume-title":"Titkos\u00edt\u00e1s \u00e9s adatrejt\u00e9s. Biztons\u00e1gos kommunik\u00e1ci\u00f3 \u00e9s algoritmikus adatv\u00e9delem","author":"T. Viraszt\u00f3","year":"2004","unstructured":"Viraszt\u00f3, T., Titkos\u00edt\u00e1s \u00e9s adatrejt\u00e9s. Biztons\u00e1gos kommunik\u00e1ci\u00f3 \u00e9s algoritmikus adatv\u00e9delem, Budapest: Netacademia, 2004."},{"key":"3798_CR13","unstructured":"Antiduh Antiduh\/errorcorrection: implements reed-solomon forward error correction in C#, GitHub. https:\/\/github.com\/antiduh\/ErrorCorrection. Accessed 2023\/02\/05."},{"key":"3798_CR14","unstructured":"Ltd 4i2i Cin.: Reed-solomon codes. \nhttps:\/\/www.cs.cmu.edu\/~guyb\/realworld\/reedsolomon\/reed_solomon_codes.html. Accessed 2023\/02\/05."},{"key":"3798_CR15","unstructured":"NSEC, NSec. https:\/\/nsec.rocks\/docs\/api\/nsec.cryptography. Accessed 2023\/02\/05."},{"key":"3798_CR16","unstructured":"NSEC, NSec. https:\/\/nsec.rocks\/docs\/api\/nsec.cryptography.aeadalgorithm#aes256gcm. Accessed 2023\/02\/05."},{"key":"3798_CR17","unstructured":"NSEC, NSec. https:\/\/nsec.rocks\/. Accessed 2023\/02\/05."},{"key":"3798_CR18","unstructured":"Christianlundkvist\/blog.: GitHub. \nhttps:\/\/github.com\/christianlundkvist\/blog\/blob\/6a33c65138d2dd5df3aea68971fab5fc61e0e7bd\/2021_01_25_nonce_reuse_in_encryption\/nonce_reuse_in_encryption.md. Accessed 2023\/02\/05."},{"key":"3798_CR19","unstructured":"Password Hashing Competition. https:\/\/www.password-hashing.net\/. Accessed 2023\/02\/05."},{"key":"3798_CR20","unstructured":"Password Storage Cheat Sheet \u2013 OWASP Cheat Sheet Series. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Password_Storage_Cheat_Sheet.html. Accessed 2023\/02\/05."},{"key":"3798_CR21","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Dinu, D., and Khovratovich, D., Argon2: new generation of memory-hard functions for password hashing and other applications, Proc. IEEE European Symp. on Security and Privacy (EuroS&P), Saarbr\u00fccken, 2016, pp. 292\u2013302. https:\/\/doi.org\/10.1109\/eurosp.2016.31.","DOI":"10.1109\/eurosp.2016.31"},{"key":"3798_CR22","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Dinu, D., Khovratovich, D., and Josefsson, S., Argon2 memory-hard function for password hashing and proof-of-work applications, Internet Research Task Force (IRTF), RFC. 9106, 2021. https:\/\/doi.org\/10.17487\/rfc9106","DOI":"10.17487\/rfc9106"},{"key":"3798_CR23","unstructured":"GNU tar 1.34: 9.4.2 the blocking factor of an archivel. https:\/\/www.gnu.org\/software\/tar\/manual\/html_node\/Blocking-Factor.html. Accessed 2023\/02\/05."},{"key":"3798_CR24","volume-title":"Comparison of Brotli, Deflate, Zopfli, LZMA, LZHAM and Bzip2 Compression Algorithms","author":"J. Alakuijala","year":"2015","unstructured":"Alakuijala, J., Kliuchnikov, E., Szabadka, Z., and Vandevenne, L., Comparison of Brotli, Deflate, Zopfli, LZMA, LZHAM and Bzip2 Compression Algorithms, Google Inc., 2015, pp. 1\u20136."},{"key":"3798_CR25","unstructured":"Working with Pixel buffers, Six Labors Documentation. https:\/\/docs.sixlabors.com\/articles\/imagesharp\/pixelbuffers.html. Accessed 2023\/02\/05."},{"key":"3798_CR26","unstructured":"Alexandro, B., Can we use a cryptographic hash function to generate infinite random numbers?, Cryptography Stack Exchange. https:\/\/crypto.stackexchange.com\/a\/76389. Accessed 2023\/02\/05."},{"key":"3798_CR27","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-90r","volume-title":"Recommendation for Random Number Generation Using Deterministic Random Bit Generators","author":"E.B. Barker","year":"2007","unstructured":"Barker, E.B. and Kelsey, J.M., Recommendation for Random Number Generation Using Deterministic Random Bit Generators, US Department of Commerce, Technology Administration, National Institute of Standards and Technology, 2007. https:\/\/doi.org\/10.6028\/nist.sp.800-90r"},{"key":"3798_CR28","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/tip.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., and Simoncelli, E.P., Image quality assessment: from error visibility to structural similarity, IEEE Trans. Image Process., 2004, vol.\u00a013, pp. 600\u2013612. https:\/\/doi.org\/10.1109\/tip.2003.819861","journal-title":"IEEE Trans. Image Process."},{"key":"3798_CR29","doi-asserted-by":"publisher","unstructured":"Islam, A.U., Khalid, F., Shah, M., Khan, Z., Mahmood, T., Khan, A., Ali, U., and Naeem, M., An improved image steganography technique based on MSB using bit differencing, Proc. 6th IEEE Int. Conf. on Innovative Computing Technology (INTECH), Dublin, 2016, pp. 265\u2013269. https:\/\/doi.org\/10.1109\/intech.2016.7845020.","DOI":"10.1109\/intech.2016.7845020"},{"key":"3798_CR30","doi-asserted-by":"publisher","first-page":"14867","DOI":"10.1007\/s11042-015-2671-9","volume":"75","author":"K. Muhammad","year":"2016","unstructured":"Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., and Baik, S.W., A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image, Multimedia Tools Appl., 2016, vol. 75, pp. 14867\u201314893.","journal-title":"Multimedia Tools Appl."},{"key":"3798_CR31","doi-asserted-by":"publisher","first-page":"117","DOI":"10.4236\/jis.2019.103007","volume":"10","author":"A. Tauhid","year":"2019","unstructured":"Tauhid, A., Tasnim, M., Noor, S.A., Faruqui, N., and Yousuf, M.A., A secure image steganography using advanced encryption standard and discrete cosine transform, J. Inf. Secur., 2019, vol. 10, pp. 117\u2013129. https:\/\/doi.org\/10.4236\/jis.2019.103007","journal-title":"J. Inf. Secur."},{"key":"3798_CR32","doi-asserted-by":"publisher","first-page":"89","DOI":"10.5121\/csit.2015.50110","volume":"5","author":"O. Khalind","year":"2015","unstructured":"Khalind, O. and Aziz, B., LSB steganography with improved embedding efficiency and undetectability, Comp. Sci. Info. Tech., 2015, vol. 5, pp. 89\u2013105. https:\/\/doi.org\/10.5121\/csit.2015.50110","journal-title":"Comp. Sci. Info. Tech."},{"key":"3798_CR33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.5815\/ijmsc.2021.03.03","volume":"7","author":"U.M.E. Ali","year":"2021","unstructured":"Ali, U.M.E., Ali, E., Sohrawordi, M., and Sultan, M.N., A LSB based image steganography using random pixel and bit selection for high payload, Int. J. Math. Sci. Comput., 2021, vol. 7, pp. 24\u201331. https:\/\/doi.org\/10.5815\/ijmsc.2021.03.03","journal-title":"Int. J. Math. Sci. Comput."},{"key":"3798_CR34","doi-asserted-by":"publisher","unstructured":"Prasad, S. and Pal, A.K., An RGB colour image steganography scheme using overlapping block-based pixel-value differencing, R. Soc. Open Sci., 2017, vol. 4, p.\u00a0161066. https:\/\/doi.org\/10.1098\/rsos.161066","DOI":"10.1098\/rsos.161066"},{"key":"3798_CR35","doi-asserted-by":"publisher","DOI":"10.1002\/9780470230367","volume-title":"Digital Color Image Processing","author":"A. Koschan","year":"2008","unstructured":"Koschan, A. and Abidi, M., Digital Color Image Processing, John Wiley & Sons, 2008."}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823080224.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768823080224","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823080224.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:51:49Z","timestamp":1775011909000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768823080224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":35,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["3798"],"URL":"https:\/\/doi.org\/10.1134\/s0361768823080224","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"11 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}