{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:42:59Z","timestamp":1775072579955,"version":"3.50.1"},"reference-count":26,"publisher":"Vilnius University Press","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:p\/>","DOI":"10.15388\/23-infor521","type":"journal-article","created":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T06:52:16Z","timestamp":1686811936000},"page":"449-464","source":"Crossref","is-referenced-by-count":4,"title":["A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory"],"prefix":"10.15388","author":[{"given":"Kurnia","family":"Anggriani","sequence":"first","affiliation":[]},{"given":"Shu-Fen","family":"Chiou","sequence":"additional","affiliation":[]},{"given":"Nan-I","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"6097","published-online":{"date-parts":[[2023,6,15]]},"reference":[{"issue":"1","key":"2023092512373879155_j_infor521_ref_001","doi-asserted-by":"publisher","first-page":"25","DOI":"10.6633\/IJNS.202301_25(1).03","article-title":"Research on coverless image steganography","volume":"25","year":"2023","journal-title":"International Journal of Network Security"},{"key":"2023092512373879155_j_infor521_ref_002","doi-asserted-by":"publisher","first-page":"395","DOI":"10.3390\/electronics12020395","article-title":"A high-capacity coverless information hiding based on the lowest and highest image fragments","volume":"12","year":"2023","journal-title":"Electronics"},{"issue":"1","key":"2023092512373879155_j_infor521_ref_003","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TNSE.2020.3041529","article-title":"Novel coverless steganography method based on image selection and StarGAN","volume":"9","year":"2022","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"2023092512373879155_j_infor521_ref_004","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TIFS.2021.3111713","article-title":"Efficient steganography in JPEG images by minimizing performance of optimal detector","volume":"17","year":"2022","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2023092512373879155_j_infor521_ref_005","doi-asserted-by":"publisher","first-page":"75184","DOI":"10.1109\/ACCESS.2020.2988566","article-title":"TR-model. A metadata profile application for personal data transparency","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"2023092512373879155_j_infor521_ref_006","doi-asserted-by":"publisher","first-page":"150081","DOI":"10.1109\/ACCESS.2020.3015962","article-title":"Security and privacy for mHealth and uHealth systems: a systematic mapping study","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"2023092512373879155_j_infor521_ref_007","doi-asserted-by":"publisher","first-page":"36515","DOI":"10.1109\/ACCESS.2020.2969039","article-title":"Financial big data analysis and early warning platform: a case study","volume":"8","year":"2020","journal-title":"IEEE Access"},{"issue":"6","key":"2023092512373879155_j_infor521_ref_008","doi-asserted-by":"publisher","first-page":"4038","DOI":"10.1109\/TCSVT.2021.3108772","article-title":"A robust coverless steganography scheme using camouflage image","volume":"32","year":"2022","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"7","key":"2023092512373879155_j_infor521_ref_009","doi-asserted-by":"publisher","first-page":"4472","DOI":"10.1016\/j.jksuci.2022.05.012","article-title":"Robust coverless steganography using limited mapping images","volume":"34","year":"2022","journal-title":"Journal of King Saud University \u2013 Computer and Information Sciences"},{"issue":"7","key":"2023092512373879155_j_infor521_ref_010","doi-asserted-by":"publisher","first-page":"4905","DOI":"10.1109\/TCSVT.2021.3135384","article-title":"A novel video steganographic scheme incorporating the consistency degree of motion vectors","volume":"32","year":"2022","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"2023092512373879155_j_infor521_ref_011","doi-asserted-by":"publisher","first-page":"31926","DOI":"10.1109\/ACCESS.2019.2901260","article-title":"Coverless information hiding method based on web text","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"7","key":"2023092512373879155_j_infor521_ref_012","doi-asserted-by":"publisher","first-page":"2779","DOI":"10.1109\/TCSVT.2020.3033945","article-title":"Coverless image steganography based on multi-object recognition","volume":"31","year":"2021","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"2023092512373879155_j_infor521_ref_013","doi-asserted-by":"publisher","first-page":"29954","DOI":"10.1109\/ACCESS.2022.3155146","article-title":"Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography\u2014an innovative approach","volume":"10","year":"2022","journal-title":"IEEE Access"},{"key":"2023092512373879155_j_infor521_ref_014","doi-asserted-by":"publisher","first-page":"161825","DOI":"10.1109\/ACCESS.2020.3021356","article-title":"A new video steganography scheme based on Shi-Tomasi corner detector","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"2023092512373879155_j_infor521_ref_015","doi-asserted-by":"publisher","first-page":"40120","DOI":"10.1109\/ACCESS.2019.2904248","article-title":"Personal data trading scheme for data brokers in IoT data marketplaces","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"9","key":"2023092512373879155_j_infor521_ref_016","doi-asserted-by":"publisher","first-page":"5817","DOI":"10.1109\/TCSVT.2022.3161419","article-title":"A robust coverless steganography based on generative adversarial networks and gradient descent approximation","volume":"32","year":"2022","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"2023092512373879155_j_infor521_ref_017","doi-asserted-by":"publisher","first-page":"171372","DOI":"10.1109\/ACCESS.2019.2955452","article-title":"Coverless image steganography: a survey","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"2023092512373879155_j_infor521_ref_018","doi-asserted-by":"publisher","first-page":"16522","DOI":"10.1109\/ACCESS.2021.3050737","article-title":"Coverless image steganography based on optical mark recognition and machine learning","volume":"9","year":"2021","journal-title":"IEEE Access"},{"issue":"9","key":"2023092512373879155_j_infor521_ref_019","doi-asserted-by":"publisher","first-page":"1472","DOI":"10.1109\/TCOM.1980.1094838","article-title":"Computer security and networking protocols: technical issues in military data communications networks","volume":"28","year":"1980","journal-title":"IEEE Transactions on Communications"},{"key":"2023092512373879155_j_infor521_ref_020","doi-asserted-by":"publisher","first-page":"95665","DOI":"10.1109\/ACCESS.2019.2929123","article-title":"A coverless plain text steganography based on character features","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"2023092512373879155_j_infor521_ref_021","doi-asserted-by":"publisher","first-page":"119393","DOI":"10.1109\/ACCESS.2019.2936614","article-title":"A cover selection HEVC video steganography based on intra prediction mode","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"2023092512373879155_j_infor521_ref_022","doi-asserted-by":"publisher","first-page":"108579","DOI":"10.1109\/ACCESS.2020.3000993","article-title":"A novel coverless information hiding method based on the most significant bit of the cover image","volume":"8","year":"2020","journal-title":"IEEE Access"},{"issue":"8","key":"2023092512373879155_j_infor521_ref_023","doi-asserted-by":"publisher","first-page":"2217","DOI":"10.1109\/TIFS.2019.2895200","article-title":"AHCM: adaptive Huffman code mapping for audio steganography based on psychoacoustic model","volume":"14","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"2023092512373879155_j_infor521_ref_024","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","article-title":"Robust coverless image steganography based on DCT and LDA topic classification","volume":"20","year":"2018","journal-title":"IEEE Transactions on Multimedia"},{"key":"2023092512373879155_j_infor521_ref_025","doi-asserted-by":"publisher","first-page":"179891","DOI":"10.1109\/ACCESS.2019.2955990","article-title":"Faster-RCNN based robust coverless information hiding system in cloud environment","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"12","key":"2023092512373879155_j_infor521_ref_026","doi-asserted-by":"publisher","first-page":"9332","DOI":"10.1109\/JIOT.2021.3103779","article-title":"Coverless information hiding based on probability graph learning for secure communication in IoT environment","volume":"9","year":"2022","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Informatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1297\/text","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1297\/text","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T13:43:32Z","timestamp":1695649412000},"score":1,"resource":{"primary":{"URL":"https:\/\/informatica.vu.lt\/doi\/10.15388\/23-INFOR521"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":26,"alternative-id":["10.15388\/23-INFOR521"],"URL":"https:\/\/doi.org\/10.15388\/23-infor521","relation":{},"ISSN":["0868-4952","1822-8844"],"issn-type":[{"value":"0868-4952","type":"print"},{"value":"1822-8844","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}