{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:29:34Z","timestamp":1755797374857,"version":"3.44.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1109\/ic3i59117.2023.10397959","type":"proceedings-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T13:27:08Z","timestamp":1706275628000},"page":"49-55","source":"Crossref","is-referenced-by-count":0,"title":["Concealing Information in Images: A Review of Steganography Method"],"prefix":"10.1109","author":[{"given":"Manish","family":"Chaudhary","sequence":"first","affiliation":[{"name":"Lovely Professional University,Jalandhar,Punjab,India"}]},{"given":"Rishav","family":"Sharma","sequence":"additional","affiliation":[{"name":"Lovely Professional University,Jalandhar,Punjab,India"}]},{"given":"Sahil","family":"Tiwari","sequence":"additional","affiliation":[{"name":"Lovely Professional University,Jalandhar,Punjab,India"}]},{"given":"Akshat Singh","family":"Tomar","sequence":"additional","affiliation":[{"name":"Lovely Professional University,Jalandhar,Punjab,India"}]},{"given":"Shaurya","family":"Singh","sequence":"additional","affiliation":[{"name":"Lovely Professional University,Jalandhar,Punjab,India"}]},{"given":"Krishna","family":"Kumar","sequence":"additional","affiliation":[{"name":"Lovely Professional University,Jalandhar,Punjab,India"}]},{"given":"Manjot","family":"Kaur","sequence":"additional","affiliation":[{"name":"Lovely Professional University,Jalandhar,Punjab,India"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","first-page":"4447","article-title":"An efficient image steganography scheme based on hybrid edge detection and pixel-value differencing method","volume":"12","author":"Singh","year":"2021","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"43","key":"ref2","first-page":"32415","article-title":"Image steganography based on quantization index modulation and generative adversarial network","volume":"79","author":"Zhang","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"ref3","first-page":"15777","article-title":"A new image steganography scheme using adaptive embedding based on deep learning","volume":"80","author":"Liu","year":"2021","journal-title":"Multimedia Tools and Applications"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"148458","DOI":"10.1109\/ACCESS.2020.3044568","article-title":"A novel reversible data hiding scheme in encrypted images based on steganography and scrambling","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"issue":"4","key":"ref5","first-page":"1337","article-title":"A novel image steganography method based on DNA computing and chaotic system","volume":"33","author":"Li","year":"2021","journal-title":"Neural Computing and Applications"},{"issue":"35","key":"ref6","first-page":"25257","article-title":"A novel approach for image steganography based on edge detection and modified LSB substitution","volume":"79","author":"Singh","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"ref7","first-page":"16009","article-title":"A reversible image steganography method based on bit-plane slicing and optimal pixel adjustment","volume":"80","author":"Zhang","year":"2021","journal-title":"Multimedia Tools and Applications"},{"issue":"43","key":"ref8","first-page":"32647","article-title":"A novel image steganography algorithm based on multi-objective particle swarm optimization","volume":"79","author":"Li","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"ref9","first-page":"1211","article-title":"A new image steganography method based on differential evolution algorithm and LSB substitution","volume":"33","author":"Ali","year":"2021","journal-title":"Neural Computing and Applications"},{"issue":"43","key":"ref10","first-page":"32435","article-title":"An efficient image steganography scheme based on singular value decomposition and particle swarm optimization","volume":"79","author":"Wang","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"ref11","first-page":"15659","article-title":"An image steganography algorithm based on double-coding and optimal index modulation","volume":"80","author":"Zhou","year":"2021","journal-title":"Multimedia Tools and Applications"},{"issue":"12","key":"ref12","first-page":"5157","article-title":"A robust and secure image steganography scheme based on two-layered embedding and reversible image watermarking","volume":"11","author":"Kumar","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"6","key":"ref13","first-page":"5673","article-title":"A new image steganography scheme based on hyperchaotic system and singular value decomposition","volume":"12","author":"Han","year":"2021","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"5\u20136","key":"ref14","first-page":"3839","article-title":"Image steganography based on pixel intensity and spatial domain","volume":"79","author":"Hussain","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"ref15","first-page":"8293","article-title":"A novel image steganography algorithm based on DCT transform and quantum computing","volume":"80","author":"Ma","year":"2021","journal-title":"Multimedia Tools and Applications"},{"issue":"9\u201310","key":"ref16","first-page":"6021","article-title":"A new image steganography approach based on circular queue and XOR operation","volume":"79","author":"Alqatawna","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"9","key":"ref17","first-page":"13023","article-title":"A novel image steganography approach using new substitution technique in wavelet domain","volume":"80","author":"Sharma","year":"2021","journal-title":"Multimedia Tools and Applications"},{"issue":"13","key":"ref18","first-page":"6621","article-title":"An image steganography algorithm based on adaptive codebook and selective embedding","volume":"33","author":"Zhang","year":"2021","journal-title":"Neural Computing and Applications"},{"issue":"4","key":"ref19","first-page":"5151","article-title":"An image steganography technique based on least significant bit substitution and randomized approach","volume":"80","author":"Singh","year":"2021","journal-title":"Multimedia Tools and Applications"}],"event":{"name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2023,9,14]]},"location":"Gautam Buddha Nagar, India","end":{"date-parts":[[2023,9,16]]}},"container-title":["2023 6th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10397581\/10397594\/10397959.pdf?arnumber=10397959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T19:30:38Z","timestamp":1755545438000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10397959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ic3i59117.2023.10397959","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]}}}