{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T18:21:30Z","timestamp":1648923690726},"reference-count":11,"publisher":"Scientific Research Publishing, Inc.","issue":"05","license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJCNS"],"published-print":{"date-parts":[[2009]]},"DOI":"10.4236\/ijcns.2009.25040","type":"journal-article","created":{"date-parts":[[2009,9,2]],"date-time":"2009-09-02T22:29:59Z","timestamp":1251930599000},"page":"363-370","source":"Crossref","is-referenced-by-count":0,"title":["Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation"],"prefix":"10.4236","volume":"02","author":[{"given":"Debnath","family":"BHATTACHARYYA","sequence":"first","affiliation":[]},{"given":"Jhuma","family":"DUTTA","sequence":"additional","affiliation":[]},{"given":"Poulami","family":"DAS","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Kumar BANDYOPADHYAY","sequence":"additional","affiliation":[]},{"given":"Tai-hoon","family":"KIM","sequence":"additional","affiliation":[]}],"member":"2751","reference":[{"key":"ref","doi-asserted-by":"crossref","unstructured":"N. Nameer and E. Eman, \u201cHiding a large amount of data with high security using steganography algorithm,\u201d Journal of Computer Sciences, pp. 223-232, April 2007.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"P. K. Amin, N. Liu, and K. P. Subbalakshmi, \u201cStatistically secure digital image data hiding,\u201d Multimedia Signal Processing, IEEE 7th Workshop, Shanghai, pp. 1-4, October 2005.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"R. Chandramouli and N. Memon, \u201cAnalysis of LSB based image steganography techniques,\u201d International Conference on Image Processing, Thessaloniki, Greece, pp. 1019-1022, 2001.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"S. Dumitrescu, X. L. Wu, and Z. Wang, \u201cDetection of LSB steganography via sample pair analysis,\u201d IEEE Transactions on Signal Processing, Vol. 51, No. 7, pp. 1995-2007, July 2003.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"B. Chen and G. W. Wornell, \u201cQuantization index modulation: A class of provably good methods for digital watermarking and information embedding,\u201d IEEE Transac-tion on Information Theory, Vol. 47, pp. 1423-1443, 2001.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"P. Moulin and J. A. O\u2019Sullivan, \u201cInformation-theoretic analysis of information hiding,\u201d IEEE International Symposium on Information Theory, Sorrento, Italy, pp. 19, June 2000.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"P. Moulin and M. K. M?hcak, \u201cA framework for evaluating the data-hiding capacity of image sources,\u201d IEEE Transaction on Image Processing, Vol. 11, pp. 1029- 1042, September 2002.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"C. Y. Lin and S. F. Chang, \u201cA robust image authentication\nmethod surviving JPEG lossy compression,\u201d SPIE, pp. 296-307, 1998.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"S. Pavan, G. Sridhar, and V. Sridhar, \u201cMultivariate entropy detector based hybrid image registration,\u201d IEEE ICASSP, Vol. 2, pp. 873-876, March 18-23, 2005.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"H. H. Pang, K. L. Tan, and X. Zhou, \u201cSteganographic schemes for file system and B-tree,\u201d IEEE Transaction on Knowledge and Data Engineering, Vol. 16, No. 6, pp. 701-713, June 2004.","DOI":"10.1109\/TKDE.2004.15"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"http:\/\/www.spychecker.com\/download\/download_stools.html, visited as on March 28, 2009","DOI":"10.1109\/TKDE.2004.15"}],"container-title":["International Journal of Communications, Network and System Sciences"],"original-title":[],"link":[{"URL":"http:\/\/www.scirp.org\/journal\/PaperDownload.aspx?DOI=10.4236\/ijcns.2009.25040","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/ijcns.2009.25040","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/ijcns.2009.25040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T07:28:47Z","timestamp":1499930927000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/ijcns.2009.25040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":11,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2009]]}},"URL":"https:\/\/doi.org\/10.4236\/ijcns.2009.25040","relation":{},"ISSN":["1913-3715","1913-3723"],"issn-type":[{"value":"1913-3715","type":"print"},{"value":"1913-3723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}