{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:16:15Z","timestamp":1776464175901,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905294","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Analysis of Several Image Steganography Techniques in Spatial Domain"],"prefix":"10.1145","author":[{"given":"Munesh Chandra","family":"Trivedi","sequence":"first","affiliation":[{"name":"Computer Science Department, ABES Engineering College, Ghaziabad, India"}]},{"given":"Shivani","family":"Sharma","sequence":"additional","affiliation":[{"name":"Computer Science Department, ABES Engineering College, Ghaziabad, India"}]},{"given":"Virendra Kumar","family":"Yadav","sequence":"additional","affiliation":[{"name":"Computer Science Department, ABES Engineering College, Ghaziabad, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Anderson R.J. \"Stretching the Limits of Steganography\" Springer Lecture pp. Notes in Computer Science vol. 2 39--48 1996.   Anderson R.J. \"Stretching the Limits of Steganography\" Springer Lecture pp. Notes in Computer Science vol. 2 39--48 1996.","DOI":"10.1007\/3-540-61996-8_30"},{"key":"e_1_3_2_1_2_1","first-page":"201","article-title":"Steganography for Radio Amateurs- A DSSS Based Approach for Slow Scan Television","author":"Camenish Westfeld A, J.","year":"2007","journal-title":"Springer-Verlag Berlin Heidelberg"},{"key":"e_1_3_2_1_3_1","unstructured":"Timothy J. Ross Fuzzy Logic with Engineering Applications Third Edition Paperback -- March 1 2010.  Timothy J. Ross Fuzzy Logic with Engineering Applications Third Edition Paperback -- March 1 2010."},{"issue":"4","key":"e_1_3_2_1_4_1","article-title":"A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier","volume":"2","author":"Bhattacharyya Souvik","year":"2011","journal-title":"Journal of Global Research in Computer Science(JGRCS)"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE","author":"Diwedi","year":"2013"},{"key":"e_1_3_2_1_6_1","first-page":"16","volume-title":"IEEE Int. Workshop Trends and Recent Achievements in IT","author":"Serdean C.V.","year":"2002"},{"key":"e_1_3_2_1_7_1","volume-title":"FEBRUARY","author":"Abdul-Aziz Gutub Adnan","year":"2010"},{"key":"e_1_3_2_1_8_1","volume-title":"Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","author":"Ankit","year":"2012"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Gutub Adnan Abdul-Aziz. 2010. Pixel indicator technique for RGB image steganography. J. of Emerging Technologies in Web Intelligence. 2 1 (Feb. 2010) 56--64.  Gutub Adnan Abdul-Aziz. 2010. Pixel indicator technique for RGB image steganography. J. of Emerging Technologies in Web Intelligence. 2 1 (Feb. 2010) 56--64.","DOI":"10.4304\/jetwi.2.1.56-64"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1947940.1948059"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5120\/644-900"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.3.2.37-44"},{"key":"e_1_3_2_1_14_1","first-page":"921987","article-title":"Steganography Using Adaptive Pixel Value Differencing (APVD) for Gray Images through Exclusion of Underflow\/Overflow","volume":"978","author":"Mandal J.K.","year":"2012","journal-title":"Computer Science & Information Series, ISBN"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20059022"},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Electronic Engineering and Computer Science","author":"V.","year":"2013"},{"key":"e_1_3_2_1_17_1","unstructured":"Ratnakirti Roy et al. \"Chaos based Edge Adaptive Image Steganography\" Elsevier nternational Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013.  Ratnakirti Roy et al. \"Chaos based Edge Adaptive Image Steganography\" Elsevier nternational Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013."},{"key":"e_1_3_2_1_18_1","unstructured":"Manglem Singh Birendra Singh and Shyam Sundar Singh \"Hiding Encrypted Message in the Features of Images \" IJCSNS vol. 7 no. 4 April 2007.  Manglem Singh Birendra Singh and Shyam Sundar Singh \"Hiding Encrypted Message in the Features of Images \" IJCSNS vol. 7 no. 4 April 2007."},{"key":"e_1_3_2_1_19_1","volume-title":"Vis. Images Signal Process","volume":"152","author":"Wu H. C."},{"key":"e_1_3_2_1_20_1","volume-title":"Thomson Brooks\/ Cole","author":"V.","year":"1999"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.09.050"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"e_1_3_2_1_23_1","unstructured":"V. I. Arnold; A. Avez \"Ergodic Problems in Classical Mechanics\" Benjamin New York 1968.  V. I. Arnold; A. Avez \"Ergodic Problems in Classical Mechanics\" Benjamin New York 1968."},{"key":"e_1_3_2_1_24_1","unstructured":"Ron Crandall \"Some Notes on Steganography\" Posted on Steganography Mailing List 1998. Source: http:\/\/www.dia.unisa.it\/~ads\/corsosecurity\/www\/CORSO-0203\/steganografia\/LINKS%20LOCALI\/matrix-encoding.pdf.  Ron Crandall \"Some Notes on Steganography\" Posted on Steganography Mailing List 1998. Source: http:\/\/www.dia.unisa.it\/~ads\/corsosecurity\/www\/CORSO-0203\/steganografia\/LINKS%20LOCALI\/matrix-encoding.pdf."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2008.2008950"},{"issue":"2","key":"e_1_3_2_1_26_1","first-page":"141","article-title":"A Survey on Image Steganography and Steganalysis","volume":"2","author":"Li Bin","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00123-6"},{"issue":"8","key":"e_1_3_2_1_28_1","first-page":"2229","article-title":"Der Chen Soong, \"Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI","volume":"3","author":"Al-Najjar Yusra A. Y.","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. International Conference on Information and Communication Technology for Competitive Strategies, ICTCS '14, November 14-16 pages 79--83 (Published by ICPS-ACM","author":"Yadav V. K."},{"key":"e_1_3_2_1_30_1","volume-title":"in Third International Conference on Recent Trends in Computing (ICRTC 2015)","author":"Yadav V. K.","year":"2015"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2014.68"},{"key":"e_1_3_2_1_32_1","first-page":"425","volume-title":"Proc. Contemporary Computing (IC3), 2014 Seventh International Conference","author":"Yadav V.K.","year":"2014"},{"key":"e_1_3_2_1_33_1","first-page":"407","volume-title":"symposium proceedings published by Springer in Communications in Computer and Information Science Series(CCIS)","volume":"467","author":"Yadav V.K.","year":"2014"},{"key":"e_1_3_2_1_34_1","first-page":"337","volume-title":"Proc. Fourth International conference Confluence 2013: The Next Generation Information Technology Summit, Sept 27-28","author":"Yadav V.K."},{"key":"e_1_3_2_1_35_1","first-page":"139","volume-title":"Proc. Fourth International conference Confluence 2013: The Next Generation Information Technology Summit, Sept 27-28","author":"Yadav V.K."},{"key":"e_1_3_2_1_36_1","volume-title":"Second International Conference on \"Emerging Research in Computing, Information, Communication and Applications\", ERCICA-2014","author":"Yadav V.K."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India","acronym":"ICTCS '16"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905294"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":36,"alternative-id":["10.1145\/2905055.2905294","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905294","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}