{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:08Z","timestamp":1730213708278,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361384","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0155-0160","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains"],"prefix":"10.1109","author":[{"given":"Dina","family":"Shehada","sequence":"first","affiliation":[{"name":"University of Sharjah,Department of Electrical,Sharjah,UAE"}]},{"given":"Ahmed","family":"Bouridane","sequence":"additional","affiliation":[{"name":"University of Sharjah,Department of Electrical,Sharjah,UAE"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICCSP.2014.6949808"},{"key":"ref2","first-page":"113","article-title":"A survey of image steganography techniques","volume":"54","author":"Hussain","year":"2013","journal-title":"International Journal of Advanced Science and Technology. (IJAST)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/B978-0-12-801328-1.00001-X","article-title":"Chapter 1 - introduction","volume-title":"Information Hiding in Speech Signals for Secure Communication","author":"Wu","year":"2015"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.sigpro.2009.08.010"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ACCESS.2020.2983175"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ISCIT.2019.8905216"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ACCESS.2019.2891247"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-030-11389-6_5"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-030-36711-4_1"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ACCESS.2020.3033895"},{"year":"2016","author":"Volkhonskiy","journal-title":"Generative adversarial networks for image steganography","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICCV.2017.244"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-642-24178-9_5"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/CVPR.2009.5206848"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3335203.3335726"},{"volume-title":"Alaska2 image steganalysis","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ISCMI.2014.24"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.3390\/technologies7020034"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361384.pdf?arnumber=10361384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T22:47:20Z","timestamp":1705099640000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361384\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361384","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}