{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:40:41Z","timestamp":1729654841925,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/aipr.2014.7041919","type":"proceedings-article","created":{"date-parts":[[2015,2,18]],"date-time":"2015-02-18T00:21:38Z","timestamp":1424218898000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Secret communication in colored images using saliency map as model"],"prefix":"10.1109","author":[{"given":"Manish","family":"Mahajan","sequence":"first","affiliation":[]},{"given":"Navdeep","family":"Kaur","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"254","article-title":"Model-based steganography","volume":"2939","author":"sallee","year":"0","journal-title":"Proceedings of the Second International Workshop on Digital Watermarking"},{"key":"ref38","first-page":"30","article-title":"A data embedding method using BPCS principle with new complexity measures","author":"hioki","year":"2002","journal-title":"Proceedings of Pacific Rim Workshop on Digital Steganography"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIS.2006.1703168"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00194-3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.008"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5564545"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2000.889233"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.07.041"},{"key":"ref35","first-page":"289","article-title":"F5-A steganographic algorithm:high capacity despite better steganalysis","volume":"2137","author":"westfeld","year":"2001","journal-title":"Proceedings of Fourth International Workshop on Information Hiding Lecture Notes in Computer Science"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79547-6_7"},{"key":"ref40","article-title":"A New Image Steganography Based on 2k Correction and Edge-Detection","author":"jae-gil","year":"2008","journal-title":"Fifth International Conference on Information Technology New Generations 978-0-7695-3099-4\/08"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383267"},{"key":"ref12","first-page":"475","article-title":"Salient Region Detection Using Contrast-Based Saliency and Watershed Segmentation","author":"ngau","year":"2009","journal-title":"Proceedings of the 2nd International Conference on Computing and Informatics 2009 (lCOCI09)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/507072.507096"},{"key":"ref14","first-page":"91","article-title":"Road Traffic Sign Saliency Map Model","author":"won","year":"2007","journal-title":"Proceedings of Image and Vision Computing New Zealand 2007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047129.83260.79"},{"key":"ref16","article-title":"A Digital Image Watermarking Using A Feature-Driven Attention Module","author":"park","year":"2002","journal-title":"Proc Visualization Imaging and Image Processing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S1047-3203(03)00037-3"},{"key":"ref18","article-title":"Salience Preserving Multi-Focus Image Fusion With Dynamic Range Compression","volume":"5","author":"hong","year":"2009","journal-title":"International Journal of Innovative Computing Information and Control ICIC International"},{"year":"0","key":"ref19"},{"key":"ref28","first-page":"545","article-title":"Graph-based visual saliency","volume":"19","author":"harel","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref4","first-page":"1","article-title":"Video attention: Learning to detect a salient object sequence","author":"liu","year":"2008","journal-title":"Proc ICPR"},{"key":"ref27","first-page":"475","article-title":"Salient Region Detection Using Contrast-Based Saliency and Watershed Segmentation","author":"ngau","year":"2009","journal-title":"Proceedings of the 2nd International Conference on Computing and Informatics 2009 (lCOCI09)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/35058500"},{"key":"ref6","first-page":"272","article-title":"Automatic attention-based prioritization of unconstrained video for compression","volume":"5292","author":"itti","year":"2004","journal-title":"Proc SPIE Human Vision and Electronic Imaging"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206596"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.834657"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378540"},{"key":"ref7","article-title":"A content-based bit allocation model for video streaming","author":"lai","year":"2004","journal-title":"Proc IEEE International Conference on Multimedia and Expo (ICME)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/34.730558","article-title":"A model of saliency-based visual attention for rapid scene analysis","volume":"20","author":"itti","year":"1998","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/957013.957094"},{"article-title":"Foundations of Vision","year":"1995","author":"wandell","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/957013.957094"},{"key":"ref22","first-page":"547","article-title":"Bayesian surprise attracts human attention","volume":"19","author":"itti","year":"2005","journal-title":"Advances in neural information processing systems"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/34.730558","article-title":"A model of saliency-based visual attention for rapid scene analysis","volume":"20","author":"itti","year":"1998","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref24","article-title":"A real-time visual attention system using integral images","author":"frintrop","year":"2007","journal-title":"International Conference on Computer Vision Systems"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"36","DOI":"10.5120\/9747-4313","article-title":"An Improved Technique to Compute Visual Attention Map Based upon Wavelet Domain","volume":"60","author":"mahajan","year":"2012","journal-title":"International Journal of Computer Applications Foundation of Computer Science"},{"key":"ref23","article-title":"An affine invariant salient region detector","author":"kadir","year":"2004","journal-title":"European Conference on Computer Vision"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79547-6_7"},{"key":"ref25","first-page":"219","article-title":"Shifts in selective visual attention: Towards the underlying neural circuitry","volume":"4","author":"koch","year":"1985","journal-title":"Human Neurobiology"}],"event":{"name":"2014 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","start":{"date-parts":[[2014,10,14]]},"location":"Washington, DC, USA","end":{"date-parts":[[2014,10,16]]}},"container-title":["2014 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7029842\/7041894\/07041919.pdf?arnumber=7041919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T01:09:49Z","timestamp":1566349789000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7041919\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/aipr.2014.7041919","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}