{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:47:18Z","timestamp":1761662838975,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/cvprw.2009.5204308","type":"proceedings-article","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T13:36:32Z","timestamp":1267450592000},"page":"85-92","source":"Crossref","is-referenced-by-count":18,"title":["Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching"],"prefix":"10.1109","author":[{"given":"Neha","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"Marios","family":"Savvides","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2003.1289414"},{"key":"13","first-page":"297","article-title":"An adaptive dct-based mod-4 steganographic method","volume":"2","author":"qi","year":"2005","journal-title":"IEEE International Conference on Image Processing"},{"journal-title":"Digital Watermarking and Steganography","year":"2007","author":"shin","key":"14"},{"journal-title":"A Survey of Steganographic Techniques in Information Hiding","year":"2000","author":"johnson","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"},{"key":"3","first-page":"243","volume":"111","author":"cox","year":"1996","journal-title":"Secure spread spectrum watermarking for images audio and video"},{"journal-title":"Dct domain message embedding in spread spectrum steganography system Accepted at Data Compression Conference 2009","year":"2009","author":"agrawal","key":"2"},{"journal-title":"Iris Challenge Evaluation","year":"2006","key":"1"},{"journal-title":"Information Hiding","year":"2001","author":"johnson","key":"10"},{"key":"7","first-page":"19","article-title":"Overview of iris recognition","author":"horst","year":"2008","journal-title":"Journal of Student Reserch"},{"key":"6","article-title":"Hamming distance optimized phase masks for iris recognition system","author":"fana","year":"2005","journal-title":"Topical Meeting on Computational Optical Sensing and Imaging (COSI)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.812753"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1240122"},{"key":"8","first-page":"97","article-title":"Hiding fingerprint minutiae in images","author":"jain","year":"2002","journal-title":"Proc Workshop Automatic Identification Advanced Technologies (AutoID)"}],"event":{"name":"2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","start":{"date-parts":[[2009,6,20]]},"location":"Miami, FL","end":{"date-parts":[[2009,6,25]]}},"container-title":["2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5191364\/5204041\/05204308.pdf?arnumber=5204308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T22:24:03Z","timestamp":1568672643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5204308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cvprw.2009.5204308","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}