{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T12:58:50Z","timestamp":1725713930519},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2008,11,1]],"date-time":"2008-11-01T00:00:00Z","timestamp":1225497600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2008,11,1]],"date-time":"2008-11-01T00:00:00Z","timestamp":1225497600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icdim.2008.4746807","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T15:29:46Z","timestamp":1232119786000},"page":"922-924","source":"Crossref","is-referenced-by-count":6,"title":["Combating digital document forgery using new secure information hiding algorithm"],"prefix":"10.1109","author":[{"given":"Abbas","family":"Cheddad","sequence":"first","affiliation":[{"name":"School of Computing and Intelligent Systems, Faculty of Computing and Engineering, Londonderry, BT48 7JL, Northern Ireland, United Kingdom"}]},{"given":"Joan","family":"Condell","sequence":"additional","affiliation":[{"name":"School of Computing and Intelligent Systems, Faculty of Computing and Engineering, Londonderry, BT48 7JL, Northern Ireland, United Kingdom"}]},{"given":"Kevin","family":"Curran","sequence":"additional","affiliation":[{"name":"School of Computing and Intelligent Systems, Faculty of Computing and Engineering, Londonderry, BT48 7JL, Northern Ireland, United Kingdom"}]},{"given":"Paul","family":"McKevitt","sequence":"additional","affiliation":[{"name":"Fac. of Comput. & Eng., Sch. of Comput. & Intell. Syst., Univ. of Ulster, Londonderry"}]}],"member":"263","reference":[{"article-title":"Statistical Tools for Digital Image Forensics","year":"2005","author":"popescu","key":"ref7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2006.4289889"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref6","first-page":"61","author":"farid","year":"0","journal-title":"Fundamentals of Image Processing Available from"},{"key":"ref5","first-page":"30","article-title":"A Data Embedding Method Using BPCS Principle With New Complexity Measures","author":"hirohisa","year":"2002","journal-title":"Proc of Pacific Rim Workshop on Digital Steganography 2002"},{"journal-title":"The national Archives (UK government's records and information management) available from","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2008.4746742"}],"event":{"name":"2008 Third International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2008,11,13]]},"location":"London, UK","end":{"date-parts":[[2008,11,16]]}},"container-title":["2008 Third International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733742\/4746691\/04746807.pdf?arnumber=4746807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T21:54:15Z","timestamp":1683150855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4746807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/icdim.2008.4746807","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}