{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:43:27Z","timestamp":1756464207156,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/icdsp.2013.6622828","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T21:46:58Z","timestamp":1382046418000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["A novel steganographic method based on edge detection and adaptive multiple bits substitution"],"prefix":"10.1109","author":[{"given":"Mehran","family":"Iranpour","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232466"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2011.6048469"},{"key":"14","doi-asserted-by":"crossref","first-page":"15","DOI":"10.5120\/7431-0369","article-title":"Image steganography by variable embedding and multiple edge detection using canny operator","volume":"48","author":"geetha","year":"2012","journal-title":"International Journal of Computer Applications (0975-888)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.09.002"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.187"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2010.08.007"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E93.D.79"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926097"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/249826"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.06.003"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2011.73"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-009-0440-3"},{"key":"8","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","article-title":"Edge adaptive image steganography based on LSB matching revisited","volume":"5","author":"luo","year":"2010","journal-title":"IEEE Transactions on Information Forensics and Security"}],"event":{"name":"2013 18th International Conference on Digital Signal Processing (DSP)","start":{"date-parts":[[2013,7,1]]},"location":"Fira, Santorini, Greece","end":{"date-parts":[[2013,7,3]]}},"container-title":["2013 18th International Conference on Digital Signal Processing (DSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6599036\/6622665\/06622828.pdf?arnumber=6622828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:05:27Z","timestamp":1498089927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6622828\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icdsp.2013.6622828","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}