{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T13:59:00Z","timestamp":1762351140976,"version":"3.33.0"},"reference-count":19,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2008,3,17]]},"DOI":"10.1080\/15567280701797087","type":"journal-article","created":{"date-parts":[[2008,3,13]],"date-time":"2008-03-13T04:25:57Z","timestamp":1205382357000},"page":"27-36","source":"Crossref","is-referenced-by-count":18,"title":["Graphstega: Graph Steganography Methodology"],"prefix":"10.1080","volume":"2","author":[{"given":"Abdelrahman","family":"Desoky","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Younis","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Kipper, G. 2004.Investigator's Guide to Steganography, 15\u201316. CRC Press LLC.","DOI":"10.1201\/9780203504765"},{"volume-title":"Information Hiding","year":"2000","author":"Johnson N. F.","key":"CIT0004"},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M. H. and Shirali-Shahreza, M. A New Approach to Persian\/Arabic Text Steganography. Proceedings of 5th IEEE\/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006). Honolulu, Hawaii. July,","DOI":"10.1109\/ICCIT.2007.100"},{"volume-title":"The Codebreakers: The Story of Secret Writing","year":"1996","author":"Kahn D.","key":"CIT0006"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119291866883"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860769-9\/50033-0"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Chapman, M. and Davida, G. Lecture Notes in Computer Science. Proceedings of the International Conference on Information and Communications Security. Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text, Vol. 1334, pp.335\u2013345. Springer.","DOI":"10.1007\/BFb0028489"},{"volume-title":"Proceedings of Information Hiding Workshop (IH 2005)","year":"2005","author":"Grothof C.","key":"CIT0011"},{"volume-title":"Proceedings of the 21st Annual ACM Symposium on Applied Computing (SAC\u201906)","year":"2006","author":"Stutsman R.","key":"CIT0012"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859370"},{"key":"CIT0014","unstructured":"Cvejic, N. and Seppanen, T. Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC\u201904). Las Vegas, Nevada. April,"},{"key":"CIT0015","unstructured":"Cvejic, N. and Seppanen, T. Proceedings of the 7th International Conference on Signal Processing (ICSP 04). \u201cReduced Distortion Bit-Modification for LSB Audio Steganography.\u201d, Beijing, China, August 2004"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"CIT0017","unstructured":"Kirovski, D. and Malvar, H. Spread-Spectrum Audio Watermarking: Requirements, Applications, and Limitations. Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing. Cannes, France. October,"},{"key":"CIT0018","doi-asserted-by":"crossref","unstructured":"Ansari, R., Malik, H. and Khokhar, A. Data-Hiding in Audio Using Frequency-Selective Phase Alteration. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing. Vol. 5, May, pp.389\u2013392.","DOI":"10.1109\/ICASSP.2004.1327129"},{"key":"CIT0019","unstructured":"Gruhl, D., Lu, A. and Bender, W. Lecture Notes in Computer Science. Proceedings of First International Workshop on Information Hiding. Echo Hiding, Vol. 1174, pp.293\u2013315. Springer."},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1145\/163114.163119"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/BF00265077"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8592-7"}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T02:39:09Z","timestamp":1738118349000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15567280701797087"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,17]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3,17]]}},"alternative-id":["10.1080\/15567280701797087"],"URL":"https:\/\/doi.org\/10.1080\/15567280701797087","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"type":"print","value":"1556-7281"},{"type":"electronic","value":"1556-7346"}],"subject":[],"published":{"date-parts":[[2008,3,17]]}}}