{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:44:44Z","timestamp":1729608284730,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732148","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T20:57:45Z","timestamp":1478638665000},"page":"826-831","source":"Crossref","is-referenced-by-count":1,"title":["Local binary pattern operator based steganography in wavelet domain"],"prefix":"10.1109","author":[{"given":"Anuradha","family":"Singhal","sequence":"first","affiliation":[]},{"given":"Punam","family":"Bedi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"1085","article-title":"Adaptive Data Hiding for Images Based on Harr Discrete Wavelet transform","volume":"4319","author":"chang","year":"0","journal-title":"Lecture Notes in Computer Science"},{"year":"2007","key":"ref30","article-title":"The Local Binary Pattern Bibliography"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1364\/OPEX.13.001307","article-title":"Geometric attack resistant watermarking in wavelet transform domain","volume":"13","author":"choong","year":"2005","journal-title":"Optics Express"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/CHSTUADVMTH"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2000.889233"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NRSC.2008.4542319"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.07.041"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970104"},{"key":"ref16","first-page":"951","article-title":"Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns","volume":"24","author":"maenpaa","year":"2002","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1044854"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/978-3-540-24670-1_36","article-title":"Face Recognition with Local Binary Patterns","author":"ahonen","year":"2004","journal-title":"Lecture Notes in Computer Science Computer Vision - ECCV"},{"year":"0","author":"maenpaa","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2011.642066"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"ref27","first-page":"528","article-title":"A blind scene-based watermarking for video copyright protection","volume":"67","author":"majid","year":"2013","journal-title":"AEU"},{"key":"ref3","article-title":"Genetic algorithm based steganography using wavelets","volume":"4812","author":"kiran kumar","year":"2007","journal-title":"Information Systems Security"},{"key":"ref6","first-page":"323","article-title":"Defending against statistical steganalysis","author":"provos","year":"2001","journal-title":"10th USENIX Security Symp"},{"key":"ref29","article-title":"Semi-fragile spatial watermarking based on local binary pattern operators","volume":"284","author":"zhang","year":"2011","journal-title":"Optics Communications"},{"key":"ref5","first-page":"1","article-title":"Data hiding: current status and key issues","volume":"4","author":"wu","year":"2007","journal-title":"Int J Network Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/30.125072"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_21"},{"key":"ref2","article-title":"An adaptive steganography technique based on integer wavelet transform","author":"zayed","year":"2009","journal-title":"ICNMM"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-005-0194-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00067-4"},{"key":"ref22","article-title":"Image description using joint distribution of filter bank responses","volume":"30","author":"timo","year":"2009","journal-title":"Pattern Recognition Letters"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/S0031-3203(00)00010-8","article-title":"Texture discrimination with multidimensional distributions of signed gray level differences","volume":"34","author":"valkealahti","year":"2001","journal-title":"Pattern Recognition"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1695-1_30"},{"key":"ref23","article-title":"A steganographic method based on Integer Wavelet Transform and Genetic Algorithm","author":"elham","year":"2011","journal-title":"2011 Communications and Signal Processing (ICCSP)"},{"key":"ref26","first-page":"296","article-title":"An Image Watermarking Method Based On the Wavelet Transform","volume":"1","author":"miyazaki","year":"2002","journal-title":"Proc ICIP 1999"},{"key":"ref25","first-page":"275","article-title":"A DWT Based Approach for Image Steganography","volume":"4","author":"lin","year":"2006","journal-title":"IJASEIT"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732148.pdf?arnumber=7732148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:06:19Z","timestamp":1498359979000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732148\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732148","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}