{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:47:42Z","timestamp":1773773262283,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/cns59707.2023.10288753","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T17:47:13Z","timestamp":1698428833000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["SecureImgStego: A Keyed Shuffling-based Deep Learning Model for Secure Image Steganography"],"prefix":"10.1109","author":[{"given":"Trishna","family":"Chakraborty","sequence":"first","affiliation":[{"name":"University of California,Irvine"}]},{"given":"Imranur","family":"Rahman","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Hasan","family":"Murad","sequence":"additional","affiliation":[{"name":"Chittagong University of Engineering and Technology"}]},{"given":"Md Shohrab","family":"Hossain","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology"}]},{"given":"Shagufta","family":"Mehnaz","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"1","article-title":"An overview of steganography for the computer forensics examiner","volume":"6","author":"Kessler","year":"2004","journal-title":"Forensic science communications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-385510-7.00002-3"},{"issue":"2","key":"ref3","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"Li","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2014.09.001"},{"key":"ref5","first-page":"2069","article-title":"Hiding images in plain sight: Deep steganography","volume-title":"Advances in Neural Information Processing Systems","author":"Baluja"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891247"},{"issue":"8","key":"ref8","article-title":"Steganography gan: Cracking steganography with cycle generative adversarial networks","volume":"arXiv:2006","author":"Khan","year":"2020","journal-title":"arXiv preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1117\/12.465263"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1117\/12.477313"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00267"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.33969\/AIS.2019.11009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2018.8488111"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971528"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015687"},{"key":"ref16","volume-title":"Tiny imagenet","year":"2022"},{"key":"ref17","article-title":"Stegexpose-a tool for detecting lsb steganography","author":"Boehm","year":"2014","journal-title":"arXiv preprint arXiv:1410.6656"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2007.369349"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00161"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2020-2380"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.01.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3012452"},{"key":"ref24","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"International Conference on Machine Learning","author":"Gilad-Bachrach"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3675459"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971528"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref28","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint arXiv:1412.6980"},{"key":"ref29","volume-title":"Rethinking the inception architecture for computer vision","author":"Szegedy","year":"2015"},{"key":"ref30","volume-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2019.73002"}],"event":{"name":"2023 IEEE Conference on Communications and Network Security (CNS)","location":"Orlando, FL, USA","start":{"date-parts":[[2023,10,2]]},"end":{"date-parts":[[2023,10,5]]}},"container-title":["2023 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10288629\/10288642\/10288753.pdf?arnumber=10288753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T10:07:53Z","timestamp":1709374073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10288753\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cns59707.2023.10288753","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}