{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:05:37Z","timestamp":1758891937558,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Project of the National Research Program for Universities (NRPU-2016)","award":["6282\/Punjab\/NRPU\/R&D\/HEC\/2016"],"award-info":[{"award-number":["6282\/Punjab\/NRPU\/R&D\/HEC\/2016"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2815037","type":"journal-article","created":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T18:14:14Z","timestamp":1520878454000},"page":"16189-16206","source":"Crossref","is-referenced-by-count":20,"title":["Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering"],"prefix":"10.1109","volume":"6","author":[{"given":"Amna","family":"Shifa","sequence":"first","affiliation":[]},{"given":"Muhammad S.","family":"Afgan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7460-266X","authenticated-orcid":false,"given":"Mamoona N.","family":"Asghar","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Fleury","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Memon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1494-1381","authenticated-orcid":false,"given":"Saima","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Nadia","family":"Rasheed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPSI.2016.078592"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"125","DOI":"10.5121\/ijcnc.2013.5310","article-title":"A secure data communication system using cryptography and steganography","volume":"5","author":"saraireh","year":"2013","journal-title":"Int J Comput Netw Commun"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref32","first-page":"34","article-title":"Review on various clustering methods for the image data","volume":"2","author":"tayal","year":"2010","journal-title":"J Emerg Trends Comput Inf Sci"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3_4"},{"key":"ref30","first-page":"47","article-title":"Cluster based image steganography using pattern matching","volume":"2","author":"singh","year":"2013","journal-title":"Int J Emerg Trends Sci Technol"},{"key":"ref37","first-page":"286","article-title":"A new approach for LSB based image steganography using secret key","author":"karim","year":"2011","journal-title":"Proc 14th Int Conf Comput Inf Technol"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4111-x"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1049\/el:20080522","article-title":"Scope of validity of PSNR in image\/video quality assessment","volume":"44","author":"ghanbari","year":"2008","journal-title":"Electron Lett"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2273671"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.116724"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732209"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4304\/jetwi.2.1.56-64"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2009.5384692"},{"key":"ref14","first-page":"804","article-title":"Image segmentation by using edge detaction","volume":"2","author":"al-amri","year":"2010","journal-title":"Int J Comput Sci Eng"},{"key":"ref15","first-page":"34","article-title":"Least significant bit algorithm for image steganography","volume":"3","author":"champakamala","year":"2014","journal-title":"Int J Adv Comput Technol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.22.4.043009"},{"key":"ref18","first-page":"275","article-title":"A DWT based approach for image steganography","volume":"4","author":"chen","year":"2006","journal-title":"Int J Appl Sci Eng"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2007.05.063"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2011.6182134"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2671-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5121\/sipij.2010.1206"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3398-y"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2017.7991125"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2012.V2.159"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"ref8","first-page":"1","article-title":"New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm","volume":"143","author":"abdullah","year":"2016","journal-title":"Int J Comput Appl"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.16"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3429-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NTICT.2017.7976154"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3834-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2016.7550955"},{"key":"ref22","first-page":"127","article-title":"Image based steganography and cryptography","author":"bloisi","year":"2007","journal-title":"Proc 2nd Int Conf Comput Vis Theory Appl"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2014.6850714"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.177"},{"key":"ref23","first-page":"86","article-title":"A new LSB-S image steganography method blend with cryptography for secret communication","author":"joshi","year":"2016","journal-title":"Proc 3rd Int Conf Image Process"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.521"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"976","DOI":"10.24297\/ijct.v9i1.4160","article-title":"Image steganography combined with cryptography","volume":"9","author":"sridevi","year":"2010","journal-title":"Int J Comput Technol"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08314684.pdf?arnumber=8314684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:16:15Z","timestamp":1642004175000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8314684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2815037","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}