{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:50:33Z","timestamp":1769752233703,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10725652","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Augmented Data Protection: Fortifying Confidentiality through CBBPH approach"],"prefix":"10.1109","author":[{"given":"Aayushi Jeeban","family":"Tripathy","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science Engineering,Bengaluru,India"}]},{"given":"Utkarsh","family":"Tiwari","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science Engineering,Bengaluru,India"}]},{"given":"Anirudh","family":"S","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science Engineering,Bengaluru,India"}]},{"given":"Siddhant","family":"Ashwani","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science Engineering,Bengaluru,India"}]},{"given":"C. R.","family":"Kavitha","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science Engineering,Bengaluru,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0146-3_134"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/9780429504044-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-123-2"},{"key":"ref4","article-title":"Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text","author":"Bennett","year":"2004","journal-title":"Dept. of Linguistics preliminary examination requirement"},{"key":"ref5","article-title":"A New Steganographic Technique Matching the Secret Message and Cover image Binary Value","author":"Umamaheswari","year":"2017","journal-title":"arXiv"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2016.070543"},{"issue":"3B","key":"ref7","article-title":"Breaking Predictive-Coding-Based Steganography and Modification for Enhanced Security","volume":"6","author":"Liu","year":"2006","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref8","article-title":"Data hiding in JPEG images","author":"Muttoo","year":"2006","journal-title":"International Journal of Information Technology (IJIT)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/11981-7854"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2016.06.06"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5120\/10058-4650"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2020920808"},{"key":"ref13","article-title":"Steganography Imaging System (SIS): Hiding Secret Message inside an Image","author":"Ibrahim","year":"2010","journal-title":"Lecture Notes in Engineering and Computer Science. 2186"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/r10-htc57504.2023.10461924"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icirca51532.2021.9545022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/iceca.2019.8822127"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kamand, India","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10725652.pdf?arnumber=10725652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:45:22Z","timestamp":1732689922000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10725652\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10725652","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}