{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:17:20Z","timestamp":1772911040383,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T00:00:00Z","timestamp":1650585600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T00:00:00Z","timestamp":1650585600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,22]]},"DOI":"10.1109\/icccs55155.2022.9846251","type":"proceedings-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T16:02:40Z","timestamp":1660579360000},"page":"168-173","source":"Crossref","is-referenced-by-count":3,"title":["Comparison of Data Hiding Techniques for Video Watermarking Applications"],"prefix":"10.1109","author":[{"given":"Farnaz","family":"Arab","sequence":"first","affiliation":[{"name":"Felician University,Rutherford,NJ,USA"}]},{"given":"Mazdak","family":"Zamani","sequence":"additional","affiliation":[{"name":"Felician University,Rutherford,NJ,USA"}]},{"given":"Sasan","family":"Karamizadeh","sequence":"additional","affiliation":[{"name":"ICT Research Institute,Iran"}]},{"given":"Mojtaba","family":"Alizadeh","sequence":"additional","affiliation":[{"name":"Lorestan University,Iran"}]},{"given":"Saman Shojae","family":"Chaeikar","sequence":"additional","affiliation":[{"name":"Macquarie University,Australia"}]},{"given":"Touraj","family":"Khodadadi","sequence":"additional","affiliation":[{"name":"MUST,Malaysia"}]}],"member":"263","reference":[{"key":"ref39","first-page":"130","article-title":"Partial Smooth Region Photos Statistical Steganalysis","volume":"4","author":"altaay","year":"2013","journal-title":"International Journal of Information Processing and Management"},{"key":"ref38","first-page":"29","article-title":"Multimedia Data Hiding Evaluation Metrics Recent Researches in Information Science and Applications","author":"altaay","year":"2013","journal-title":"WSEAS"},{"key":"ref33","article-title":"Azizah Technique for Efficiency Measurement in Steganography","author":"zamani","year":"2012","journal-title":"8th International Conference on Information Science and Digital Content Technology"},{"key":"ref32","first-page":"2798","volume":"229","author":"zamani","year":"2012","journal-title":"Mazdak Technique for PSNR Estimation in Audio Steganography Applied Mechanics and Materials"},{"key":"ref31","first-page":"163","article-title":"Correlation between PSNR and Bit per Sample Rate in Audio Steganography Recent Researches in Communications","author":"zamani","year":"2012","journal-title":"Signals and Information Technology WSEAS"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"107","DOI":"10.4156\/jdcta.vol6.issue13.13","article-title":"An Overview on Audio Steganography Techniques","volume":"6","author":"zamani","year":"2012","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"ref37","first-page":"50","article-title":"An Introduction to Watermarking Techniques Recent Advances in Electrical and Computer Engineering","author":"altaay","year":"2013","journal-title":"WSEAS"},{"key":"ref36","first-page":"35","article-title":"Edgy Photos Statistical Steganalysis","volume":"5","author":"jabbar altaay","year":"2013","journal-title":"Advances in Information Sciences and Service Sciences"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"164","DOI":"10.4156\/jdcta.vol7.issue11.19","article-title":"Determining the Threshold of Pixel Correlativity Analysis","volume":"7","author":"jabbar altaay","year":"2013","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"ref34","first-page":"211","volume":"398","author":"jabbar altaay","year":"2013","journal-title":"Correlation Analysis of the Four Photo Themes in Five Layers Communications in Computer and Information Science"},{"key":"ref10","article-title":"Knots of Substitution Techniques of Audio Steganography","author":"zamani","year":"2009","journal-title":"International Conference on Telecom Technology and Applications"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-642-45025-9_24","volume":"398","author":"altaay","year":"2013","journal-title":"Pixel Correlation Behavior in Different Themes Communications in Computer and Information Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402644"},{"key":"ref12","first-page":"355","article-title":"A Genetic-Algorithm-Based Approach for Audio Steganography","volume":"30","author":"zamani","year":"2009","journal-title":"World Academy of Science Engineering and Technology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.22"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2009.5234863"},{"key":"ref15","first-page":"64","article-title":"An Artificial-Intelligence-Based Approach for Audio Steganography","volume":"1","author":"zamani","year":"2009","journal-title":"MASAUM journal of Open Problems in Science and Engineering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2009.5267197"},{"key":"ref17","article-title":"Capacity and Quality Improvement in Reversible Image Watermarking Approach","author":"abdullah","year":"2010","journal-title":"International Conference on Networked Computing and Advanced Information Management"},{"key":"ref18","first-page":"64","article-title":"Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques","volume":"1","author":"abdullah","year":"2010","journal-title":"Journal of Information Security Research"},{"key":"ref19","article-title":"Azizah&#x2019;s Method to Measure the Efficiency of Steganography Techniques","author":"zamani","year":"2010","journal-title":"2nd International Conference on Information and Multimedia Technology"},{"key":"ref28","first-page":"82","article-title":"Correlation between PSNR and Size Ratio in Audio Steganography Recent Researches in Communications","author":"zamani","year":"2012","journal-title":"Signals and Information Technology"},{"key":"ref4","first-page":"193","article-title":"VW16E: A Robust Video Watermarking Technique Using Simulated Blocks Multimedia Forensics and Security","volume":"115","author":"arab","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2012.25"},{"key":"ref3","article-title":"VW16F: A Robust Video Watermarking Using Simulated Block Based Spatial Domain Technique","author":"arab","year":"2018","journal-title":"International Conference on Security and Management"},{"key":"ref6","first-page":"6","article-title":"A Survey on Digital Image Watermarking Techniques in Spatial and Transform Domains","volume":"3","author":"araghi","year":"2016","journal-title":"International Journal of Advances in Image Processing Techniques"},{"key":"ref29","first-page":"195","article-title":"Efficient Embedding for Audio Steganography Models and Methods in Applied Sciences","author":"zamani","year":"2012","journal-title":"WSEAS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2800-5"},{"key":"ref8","article-title":"Current Problems of Substitution Technique of Audio Steganography","author":"zamani","year":"2009","journal-title":"Int Conf on Artificial Intelligence and Pattern Recognition"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-014-9936-x"},{"key":"ref2","first-page":"1","article-title":"PSW Statistical LSB Image Steganalysis","volume":"77","author":"chaeikar","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"ref9","article-title":"Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography","author":"zamani","year":"2009","journal-title":"International Conference on Genetic and Evolutionary Methods"},{"key":"ref1","first-page":"43","article-title":"Wide Smooth Region Photos Statistical Steganalysis","volume":"4","author":"altaay","year":"2013","journal-title":"Journal of Next Generation Information Technology"},{"key":"ref46","first-page":"86","article-title":"Using Three Levels DWT to Increase Robustness against Geometrical Attacks","volume":"5","author":"shams dolatabadi","year":"2013","journal-title":"International Journal of Advancements in Computing Technology"},{"key":"ref20","article-title":"Mazdak&#x2019;s Method for PSNR Estimation in Audio Steganography","author":"zamani","year":"2010","journal-title":"International Conference on Computer and Computational Intelligence"},{"key":"ref45","first-page":"35","article-title":"A New Method for Audio Steganography Using Message Integrity","volume":"8","author":"salem atoum","year":"2013","journal-title":"Journal of Convergence Information Technology"},{"key":"ref22","first-page":"89","article-title":"Genetic Audio Steganography","volume":"3","author":"zamani","year":"2010","journal-title":"International Journal on Recent Trends in Engineering & Technology"},{"key":"ref47","first-page":"33","article-title":"Improving the Capacity of Watermarking Techniques by Using Block Truncation Coding","volume":"7","author":"tohidi","year":"2013","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/978-3-642-12214-9_90","volume":"70","author":"zamani","year":"2010","journal-title":"Genetic Audio Watermarking Communications in Computer and Information Science"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2013.59"},{"key":"ref24","article-title":"Bit-Plane Model: Theory and Implementation","author":"zeki","year":"2010","journal-title":"Engineering Conference"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5124364"},{"key":"ref23","first-page":"102","article-title":"A Novel Approach for Genetic Audio Watermarking","volume":"5","author":"zamani","year":"2010","journal-title":"Journal of Information Assurance and Security"},{"key":"ref44","article-title":"Review of Digital Watermarking Techniques","author":"aghbabaeyan","year":"2013","journal-title":"The 1st international conference on Technical Education"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3923\/rjit.2011.123.131"},{"key":"ref43","first-page":"1","article-title":"Wide Flat Region Photos Statistical Steganalysis","volume":"8","author":"altaay","year":"2013","journal-title":"Journal of Convergence Information Technology"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2011.039681"}],"event":{"name":"2022 7th International Conference on Computer and Communication Systems (ICCCS)","location":"Wuhan, China","start":{"date-parts":[[2022,4,22]]},"end":{"date-parts":[[2022,4,25]]}},"container-title":["2022 7th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9845797\/9845820\/09846251.pdf?arnumber=9846251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T16:24:32Z","timestamp":1662395072000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9846251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,22]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icccs55155.2022.9846251","relation":{},"subject":[],"published":{"date-parts":[[2022,4,22]]}}}