<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>     caa a22        4500</leader>
  <controlfield tag="001">605447764</controlfield>
  <controlfield tag="003">CHVBK</controlfield>
  <controlfield tag="005">20210128100133.0</controlfield>
  <controlfield tag="007">cr unu---uuuuu</controlfield>
  <controlfield tag="008">210128e20150801xx      s     000 0 eng  </controlfield>
  <datafield tag="024" ind1="7" ind2="0">
   <subfield code="a">10.1007/s11042-014-1877-6</subfield>
   <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(NATIONALLICENCE)springer-10.1007/s11042-014-1877-6</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="2">
   <subfield code="a">A novel secure block data-hiding algorithm using cellular automata to enhance the performance of JPEG steganography</subfield>
   <subfield code="h">[Elektronische Daten]</subfield>
   <subfield code="c">[Tuan Nguyen, Somjit Arch-int, Ngamnij Arch-int]</subfield>
  </datafield>
  <datafield tag="520" ind1="3" ind2=" ">
   <subfield code="a">The computational complexity of matrix embedding (ME)-based steganography is high due to the use of the Hamming parity check matrix and matrix multiplication. Furthermore, with only one embedding change solution, ME cannot minimize embedding distortions when applied to joint photographic experts group (JPEG) steganography. In this paper, we propose a novel block data-hiding (BDH) algorithm to improve the performance of JPEG steganography. BDH allows a byte of data to be hidden in a binary block by modifying a maximum of two bits of the binary block must be changed. Moreover, BDH can be applied to the new channel selection rule for JPEG steganography with more available embedding solutions and less computational complexity than modified matrix embedding (MME). In addition, to increase the security of hidden data against extraction attacks, the secret message is encrypted by a cipher based on cellular automata (CA). The bitwise XOR operator is employed in the encryption process to maintain speed and security when a non-repeating key stream is used. The experimental results indicate that the proposed approach has a high anti-detection property against ensemble classifiers (universal steganalyzers), high security against recovery attacks, and good perceptual quality.</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
   <subfield code="a">Springer Science+Business Media New York, 2014</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Block data-hiding</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Cellular automata</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Ensemble classifier</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Steganography</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Nguyen</subfield>
   <subfield code="D">Tuan</subfield>
   <subfield code="u">Department of Computer Science, Faculty of Science, Khon Kaen University, Khon Kaen, Thailand</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Arch-int</subfield>
   <subfield code="D">Somjit</subfield>
   <subfield code="u">Department of Computer Science, Faculty of Science, Khon Kaen University, Khon Kaen, Thailand</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Arch-int</subfield>
   <subfield code="D">Ngamnij</subfield>
   <subfield code="u">Department of Computer Science, Faculty of Science, Khon Kaen University, Khon Kaen, Thailand</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="773" ind1="0" ind2=" ">
   <subfield code="t">Multimedia Tools and Applications</subfield>
   <subfield code="d">Springer US; http://www.springer-ny.com</subfield>
   <subfield code="g">74/15(2015-08-01), 5661-5682</subfield>
   <subfield code="x">1380-7501</subfield>
   <subfield code="q">74:15&lt;5661</subfield>
   <subfield code="1">2015</subfield>
   <subfield code="2">74</subfield>
   <subfield code="o">11042</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">https://doi.org/10.1007/s11042-014-1877-6</subfield>
   <subfield code="q">text/html</subfield>
   <subfield code="z">Onlinezugriff via DOI</subfield>
  </datafield>
  <datafield tag="898" ind1=" " ind2=" ">
   <subfield code="a">BK010053</subfield>
   <subfield code="b">XK010053</subfield>
   <subfield code="c">XK010000</subfield>
  </datafield>
  <datafield tag="900" ind1=" " ind2="7">
   <subfield code="a">Metadata rights reserved</subfield>
   <subfield code="b">Springer special CC-BY-NC licence</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="908" ind1=" " ind2=" ">
   <subfield code="D">1</subfield>
   <subfield code="a">research-article</subfield>
   <subfield code="2">jats</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="F">NATIONALLICENCE</subfield>
   <subfield code="b">NL-springer</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">856</subfield>
   <subfield code="E">40</subfield>
   <subfield code="u">https://doi.org/10.1007/s11042-014-1877-6</subfield>
   <subfield code="q">text/html</subfield>
   <subfield code="z">Onlinezugriff via DOI</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Nguyen</subfield>
   <subfield code="D">Tuan</subfield>
   <subfield code="u">Department of Computer Science, Faculty of Science, Khon Kaen University, Khon Kaen, Thailand</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Arch-int</subfield>
   <subfield code="D">Somjit</subfield>
   <subfield code="u">Department of Computer Science, Faculty of Science, Khon Kaen University, Khon Kaen, Thailand</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Arch-int</subfield>
   <subfield code="D">Ngamnij</subfield>
   <subfield code="u">Department of Computer Science, Faculty of Science, Khon Kaen University, Khon Kaen, Thailand</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">773</subfield>
   <subfield code="E">0-</subfield>
   <subfield code="t">Multimedia Tools and Applications</subfield>
   <subfield code="d">Springer US; http://www.springer-ny.com</subfield>
   <subfield code="g">74/15(2015-08-01), 5661-5682</subfield>
   <subfield code="x">1380-7501</subfield>
   <subfield code="q">74:15&lt;5661</subfield>
   <subfield code="1">2015</subfield>
   <subfield code="2">74</subfield>
   <subfield code="o">11042</subfield>
  </datafield>
 </record>
</collection>
