{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:18:50Z","timestamp":1730247530764,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icis.2017.7960030","type":"proceedings-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T17:18:28Z","timestamp":1498756708000},"page":"423-428","source":"Crossref","is-referenced-by-count":4,"title":["A comparision between steganography software tools"],"prefix":"10.1109","author":[{"given":"Hera","family":"Arif","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Hajjdiab","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2015","journal-title":"Features & Benefits of QuickCrypto","key":"ref10"},{"key":"ref11","article-title":"Steganographic Software: Analysis and Implementation","volume":"6","author":"ibrahim","year":"2012","journal-title":"International Journal of Computers and Communications"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.2172\/15006450"},{"key":"ref13","article-title":"An image steganography algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System","author":"mona","year":"2016","journal-title":"2016 Federated Conference on Computer Science and Information Systems (FedCSIS)"},{"key":"ref14","article-title":"Image steganography method using K-means clustering and encryption techniques","author":"mounika","year":"2016","journal-title":"Advances in Computing Communications and Informatics (ICACCI) 2016 InternationalConference"},{"year":"2015","journal-title":"Retrieved from EmbeddedSW","article-title":"OpenPuff Steganography & Watermarking","key":"ref15"},{"year":"2013","journal-title":"Peak Signal-to-Noise Ratio as an Image Quality Metric-National Instruments","key":"ref16"},{"year":"2009","journal-title":"Retrieved February 23 2017 from Walsh College","article-title":"S-Tools Steganography Software","key":"ref17"},{"key":"ref18","article-title":"Efficient steganography using least significant bit and encryption technique","author":"subha","year":"2016","journal-title":"Intelligent Systems and Control (ISCO) 2016 10th InternationalConference"},{"year":"2011","journal-title":"VSL Free Steganogrphy and Steganalysis Tool","key":"ref19"},{"key":"ref4","article-title":"Local binary pattern operator based steganography in wavelet domain","author":"bedi","year":"2016","journal-title":"Advances in Computing Communications and Informatics (ICACCI) 2016 InternationalConference"},{"key":"ref3","article-title":"(2016, October). Image steganography on coloured images using edge based Data Hiding in DCT domain","author":"banerjee","year":"0","journal-title":"2016 IEEE 7th Annual Information Technology Electronics and Mobile Communication Conference (IEMCON) IEMCON"},{"year":"0","author":"boggs","journal-title":"Steganography Analysis Efficacy and Response- Time Marshall University Forensic Science Center West Virginia State Police DigitalForensics Unit","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ICACCI.2016.7732266"},{"year":"0","author":"cheddad","journal-title":"A Comparitive Analysis of Steganographic Tools","key":"ref8"},{"year":"2017","journal-title":"Briggs Softworks CryptaPix-Image Management Encryption and Steganography Software for Windows","key":"ref7"},{"key":"ref2","article-title":"(2011, February). Steganographic Tools for BMP Image Format","volume":"2","author":"asavari deshpande","year":"0","journal-title":"International Journal of Computer Science & Emerging Technologies"},{"key":"ref1","first-page":"1062","article-title":"Information Hiding-A Survey","volume":"87","author":"anderson","year":"1999","journal-title":"Proceedings of the IEEE special issue on protection of multimedia content"},{"key":"ref9","article-title":"Steganographic Tools for BMP Image Format","volume":"2","author":"deshpande","year":"0","journal-title":"International Journal of Computer Science & Emerging Technologies"},{"year":"2016","journal-title":"What's New in NI Vision Development Module 2011-National Instruments","key":"ref20"}],"event":{"name":"2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)","start":{"date-parts":[[2017,5,24]]},"location":"Wuhan, China","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951674\/7959951\/07960030.pdf?arnumber=7960030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T00:32:37Z","timestamp":1499819557000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7960030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icis.2017.7960030","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}