{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:44:46Z","timestamp":1750394686068,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/ickii.2018.8569108","type":"proceedings-article","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T20:29:45Z","timestamp":1544473785000},"page":"86-89","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Method of Hiding Transmission of Mobile Phone Images"],"prefix":"10.1109","author":[{"given":"Jiancheng","family":"ZOU","sequence":"first","affiliation":[]},{"given":"Yanzhao","family":"LI","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"186","article-title":"The anti-attack algorithm research of the information hiding with the same image[J]","volume":"27","author":"li","year":"2010","journal-title":"Microelectronics & Computer"},{"key":"ref3","article-title":"The social impact of mobile phone shooting [J]","volume":"2014","author":"shaoxia","year":"0","journal-title":"Classic Literature"},{"key":"ref10","first-page":"56","article-title":"Research on digital watermarking technology based on LSB [J]","volume":"18","author":"ruqi","year":"2010","journal-title":"Journal of Beijing Institute of Graphic Communication"},{"key":"ref6","first-page":"54","article-title":"Exploration on BMP files based information hiding technology [J]","volume":"41","author":"linyan","year":"2008","journal-title":"Communications Technology"},{"key":"ref5","first-page":"65","article-title":"Text information hiding algorithm for BMP images [J]","volume":"2007","author":"lin","year":"0","journal-title":"Computer Programming Skills & Maintenance"},{"journal-title":"Algorithm to embed multiple digital watermarking in BMP image[D]","year":"2007","author":"dawei","key":"ref8"},{"journal-title":"Techniques for data hiding","year":"1995","author":"bender","key":"ref7"},{"key":"ref2","first-page":"27","article-title":"The implement of LSB steganography algorithm based on image[J]","volume":"2010","author":"you","year":"0","journal-title":"Computer Security"},{"key":"ref9","first-page":"30","article-title":"Digital watermarking based on LSB[J]","volume":"19","author":"bo","year":"2005","journal-title":"Journal of Heilongjiang Institute of Technology"},{"key":"ref1","first-page":"96","article-title":"Information hiding algorithm using BMP image[J]","volume":"28","author":"hongwei","year":"2006","journal-title":"Journal of Wuhan University of Technology"}],"event":{"name":"2018 1st IEEE International Conference on Knowledge Innovation and Invention (ICKII)","start":{"date-parts":[[2018,7,23]]},"location":"Jeju","end":{"date-parts":[[2018,7,27]]}},"container-title":["2018 1st IEEE International Conference on Knowledge Innovation and Invention (ICKII)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8543366\/8569041\/08569108.pdf?arnumber=8569108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:19:04Z","timestamp":1643267944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8569108\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ickii.2018.8569108","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}