{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:30:40Z","timestamp":1729665040025,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,5]]},"DOI":"10.1109\/crv.2008.54","type":"proceedings-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T16:06:36Z","timestamp":1216310796000},"page":"326-332","source":"Crossref","is-referenced-by-count":14,"title":["Enhancing Steganography in Digital Images"],"prefix":"10.1109","author":[{"given":"Abbas","family":"Cheddad","sequence":"first","affiliation":[]},{"given":"Joan","family":"Condell","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Curran","sequence":"additional","affiliation":[]},{"given":"Paul Mc","family":"Kevitt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Steganoflage","year":"0","key":"17"},{"journal-title":"F5 http","year":"0","key":"15"},{"key":"16","first-page":"29","article-title":"a comparative analysis of steganographic tools","author":"cheddad","year":"2007","journal-title":"Proceedings of the Seventh IT&T Conference"},{"key":"13","first-page":"5","article-title":"mpeg-4: an object-based multimedia coding standard supporting mobile applications. mobile networks and applications","volume":"3","author":"puri","year":"1998","journal-title":"Springer Netherlands"},{"year":"0","key":"14"},{"key":"11","first-page":"181","article-title":"near-lossless colour image compression for multimedia applications","author":"domanski","year":"2001","journal-title":"Proceedings of EURASIP ECMCS01"},{"key":"12","first-page":"1046","article-title":"face detection in color images","author":"hsu","year":"2001","journal-title":"Proc International Conference on Image Processing (ICIP01)"},{"key":"3","article-title":"introduction to information hiding","author":"petitcolas","year":"2000","journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.393.0547"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.4655281"},{"key":"10","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","article-title":"f5-steganographic algorithm: high capacity despite better steganalysis","volume":"2137","author":"westfeld","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/800064.801294"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IT.1998.713394"},{"journal-title":"Disappearing Cryptography","year":"2002","author":"wayner","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compmedimag.2007.02.013"},{"key":"9","first-page":"61","article-title":"attacks on steganographic systems breaking the steganography utilities ezstego, jsteg, steganos and s-tools and some lessons learned","author":"westfield","year":"1768","journal-title":"Proc of Third International Workshop on Information Hiding IH'99"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859370"}],"event":{"name":"2008 Canadian Conference on Computer and Robot Vision (CRV)","start":{"date-parts":[[2008,5,28]]},"location":"Windsor, Canada","end":{"date-parts":[[2008,5,30]]}},"container-title":["2008 Canadian Conference on Computer and Robot Vision"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4562080\/4562081\/04562128.pdf?arnumber=4562128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T05:58:06Z","timestamp":1497765486000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4562128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/crv.2008.54","relation":{},"subject":[],"published":{"date-parts":[[2008,5]]}}}