{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:21:32Z","timestamp":1773156092541,"version":"3.50.1"},"reference-count":20,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,2,1]],"date-time":"2017-02-01T00:00:00Z","timestamp":1485907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"Ministry of Science and Technology (MOST)","award":["MOST 105-2221-E-259-015-MY2"],"award-info":[{"award-number":["MOST 105-2221-E-259-015-MY2"]}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2016K2A9A2A05005255"],"award-info":[{"award-number":["2016K2A9A2A05005255"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["FY20"],"award-info":[{"award-number":["FY20"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1016\/j.csi.2016.10.005","type":"journal-article","created":{"date-parts":[[2016,10,17]],"date-time":"2016-10-17T21:15:39Z","timestamp":1476738939000},"page":"209-215","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":58,"special_numbering":"C","title":["Improving stego image quality in image interpolation based data hiding"],"prefix":"10.1016","volume":"50","author":[{"given":"Chin-Nung","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shen-Chieh","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Cheonshik","family":"Kim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.csi.2016.10.005_bib1","unstructured":"C.N. Yang, C.C. Lin, C.C. Chang. Steganography and Watermarking, 2013, Nova Science Publishers Inc., ISBN: 978-1-62618-317-9."},{"issue":"3","key":"10.1016\/j.csi.2016.10.005_bib2","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","article-title":"Image hiding by optimal LSB substitution and genetic algorithm","volume":"34","author":"Wang","year":"2001","journal-title":"Pattern Recognit."},{"issue":"7","key":"10.1016\/j.csi.2016.10.005_bib3","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1016\/S0031-3203(02)00289-3","article-title":"Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy","volume":"36","author":"Chang","year":"2003","journal-title":"Pattern Recognit."},{"issue":"1","key":"10.1016\/j.csi.2016.10.005_bib4","first-page":"153","article-title":"Weighted bipartite graph for locating optimal LSB substitution for secret embedding","volume":"9","author":"Yang","year":"2006","journal-title":"J. Discr. Math. Sci. Cryptogr."},{"issue":"3","key":"10.1016\/j.csi.2016.10.005_bib5","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognit."},{"issue":"4","key":"10.1016\/j.csi.2016.10.005_bib6","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","article-title":"Steganalysis of LSB matching using differences between nonadjacent pixels","volume":"75","author":"Xia","year":"2016","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"10.1016\/j.csi.2016.10.005_bib7","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/93.959097","article-title":"Detecting LSB steganography in color, and gray-scale images","volume":"8","author":"Fridrich","year":"2001","journal-title":"IEEE Multimed."},{"issue":"8","key":"10.1016\/j.csi.2016.10.005_bib8","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","article-title":"Steganalysis of least significant bit matching using multi-order differences","volume":"7","author":"Xia","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.csi.2016.10.005_bib9","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1109\/LCOMM.2007.070438","article-title":"Improving embedding efficiency of covering codes for applications in steganography","volume":"11","author":"Zhang","year":"2007","journal-title":"IEEE Commun. Lett."},{"issue":"7","key":"10.1016\/j.csi.2016.10.005_bib10","first-page":"3951","article-title":"A low distortion information hiding method based on (5, 3) Code","volume":"7","author":"Lin","year":"2011","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"10.1016\/j.csi.2016.10.005_bib11","unstructured":"C. Kim, C.N. Yang. Steganography based on grayscale images using (5, 3) Hamming code, in: Lecture Notes in Computer Science, vol. 9023, 2014, pp. 588\u2013598."},{"key":"10.1016\/j.csi.2016.10.005_bib12","doi-asserted-by":"crossref","DOI":"10.1007\/s11042-014-2355-x","article-title":"Data hiding based on overlapped pixels using hamming code","author":"Kim","year":"2014","journal-title":"Multimed. Tools Appl."},{"issue":"9","key":"10.1016\/j.csi.2016.10.005_bib13","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","article-title":"A steganographic method for images by pixel-value differencing","volume":"24","author":"Wu","year":"2003","journal-title":"Pattern Recognit. Lett."},{"issue":"12","key":"10.1016\/j.csi.2016.10.005_bib14","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1016\/j.patrec.2004.05.006","article-title":"A steganographic method for digital images using side match","volume":"25","author":"Chang","year":"2004","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.csi.2016.10.005_bib15","unstructured":"C.H. Yang, C.Y. Weng, A steganographic method for digital images by multi-pixel differencing, in: International Computer Symposium 2006 (ICS2006), 2006, pp. 831\u2013836."},{"key":"10.1016\/j.csi.2016.10.005_bib16","doi-asserted-by":"crossref","first-page":"3347","DOI":"10.1016\/j.ijleo.2015.12.055","article-title":"High payload reversible data hiding scheme using weighted matrix","volume":"127","author":"Jana","year":"2016","journal-title":"Optik"},{"key":"10.1016\/j.csi.2016.10.005_bib17","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1016\/j.compeleceng.2012.06.014","article-title":"Improving the embedding efficiency of weight matrix-based steganography for grayscale images","volume":"39","author":"Fan","year":"2013","journal-title":"Comput. Elect. Eng."},{"key":"10.1016\/j.csi.2016.10.005_bib18","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.displa.2015.10.003","article-title":"A reversible data hiding scheme based on the Sudoku technique","volume":"39","author":"Nguyen","year":"2015","journal-title":"Displays"},{"key":"10.1016\/j.csi.2016.10.005_bib19","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.sigpro.2016.02.001","article-title":"Reversible data hiding by adaptive group modification on histogram of prediction errors","volume":"125","author":"Rad","year":"2016","journal-title":"Signal Process."},{"issue":"2","key":"10.1016\/j.csi.2016.10.005_bib20","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","article-title":"Data hiding method using image interpolation","volume":"31","author":"Jung","year":"2009","journal-title":"Comput. Stand. Interfaces"}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548916301209?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548916301209?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T09:51:48Z","timestamp":1536313908000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548916301209"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":20,"alternative-id":["S0920548916301209"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2016.10.005","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2017,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Improving stego image quality in image interpolation based data hiding","name":"articletitle","label":"Article Title"},{"value":"Computer Standards & Interfaces","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.csi.2016.10.005","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}