{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:57:51Z","timestamp":1729645071486,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275894","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"1893-1897","source":"Crossref","is-referenced-by-count":2,"title":["Using photomosaic and steganographic techniques for hiding information inside image mosaics"],"prefix":"10.1109","author":[{"given":"Arthe Henriette","family":"Pascaline","sequence":"first","affiliation":[]},{"given":"Li Chun Fong","family":"Christopher","sequence":"additional","affiliation":[]},{"given":"Maleika Heenaye-Mamode","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Sameerchand","family":"Pudaruth","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"11","article-title":"Steganography Using Segmenting Mosaic Images with Embedding Data by 3 LSB S-Type Scanning","volume":"2","author":"tripathi","year":"2013","journal-title":"International Journal of Latest Trends in Engineering and Technology (IJLTET)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5120\/16693-6817"},{"key":"ref12","first-page":"219","article-title":"Attacks on Copyright Marking Systems","author":"petitcolas","year":"1998","journal-title":"Information Hiding Second International Workshop IH"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/79.879339"},{"key":"ref14","article-title":"Data Hiding using Lazy Wavelet Transform Strategy","author":"agarwal","year":"2014","journal-title":"Proceedings of the International Conference on Advances in Computer Engineering & Applications (ICACEA-2014) IMS Engineering College"},{"key":"ref4","first-page":"1422","article-title":"Data Hiding System with Mosaic Image for Protected Communication","volume":"4","author":"agrawal","year":"2013","journal-title":"International Journal of Computer Trends and Technology (IJCTT)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9790\/3021-03320107","article-title":"An Efficient Steganography with Mosaic Images for Covert Communication","volume":"3","author":"lisha","year":"2013","journal-title":"IOSR Journal of Engineering"},{"key":"ref6","first-page":"15","article-title":"Genetic Algorithm Based Mosaic Image Steganography for Enhanced Security","volume":"5","author":"soumi","year":"2014","journal-title":"International Journal of Signal and Image Processing"},{"key":"ref5","first-page":"64","article-title":"Secret Fragment Visible Mosaic Image using Genetic Algorithm","volume":"2","author":"francis","year":"2013","journal-title":"International Journal of Advanced Trends in Computer Science and Engineering"},{"key":"ref8","first-page":"212","article-title":"A Context Sensitive Tiling System for Information Hiding","volume":"3","author":"ritchey","year":"2012","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"ref7","first-page":"216","article-title":"A Survey Report on Visual Cryptography and Secret Fragment Visible Mosaic Images","volume":"3","author":"raut","year":"2014","journal-title":"International Journal of Application and Innovation in Engineering & Management"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24031-7_7"},{"key":"ref1","first-page":"109","article-title":"Multi-Layer Information Hiding - A Blend of Steganography and Visual Cryptography","volume":"19","author":"jithesh","year":"2010","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref9","first-page":"3907","article-title":"A New Method of Image Steganography with Improved Image Quality","volume":"6","author":"al-shatnawi","year":"2012","journal-title":"Applied Mathematical Sciences"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275894.pdf?arnumber=7275894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:23:24Z","timestamp":1498235004000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275894","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}