{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:47:08Z","timestamp":1766159228624,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icsecs58457.2023.10256390","type":"proceedings-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:36:02Z","timestamp":1695749762000},"page":"336-341","source":"Crossref","is-referenced-by-count":1,"title":["A New SVM-STEG Embedding Model in Steganography"],"prefix":"10.1109","author":[{"given":"Hanizan Shaker","family":"Hussain","sequence":"first","affiliation":[{"name":"Quest International University,Faculty of Computing and Engineering,Malaysia"}]},{"given":"Fazali","family":"Ghazali","sequence":"additional","affiliation":[{"name":"Universiti Islam Antarabangsa Sultan, Abdul Halim Mu&#x0027;adzam Shah,Kulliyyah of Muamalat &#x0026; Management Sciences,Malaysia"}]},{"given":"Hafiza A.","family":"S.","sequence":"additional","affiliation":[{"name":"Universiti Poly-Tech Malaysia,Faculty of Computing and Multimedia,Malaysia"}]},{"given":"Hanif Mohd","family":"Ali","sequence":"additional","affiliation":[{"name":"Universiti Islam Antarabangsa Sultan, Abdul Halim Mu&#x0027;adzam Shah,Kulliyyah of Muamalat &#x0026; Management Sciences,Malaysia"}]},{"given":"Anbuselvan","family":"Sangodiah","sequence":"additional","affiliation":[{"name":"Quest International University,Faculty of Computing and Engineering,Malaysia"}]},{"given":"Kante Koli","family":"Oumar","sequence":"additional","affiliation":[{"name":"Quest International University,Faculty of Computing and Engineering,Malaysia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2901877"},{"key":"ref35","article-title":"An overview of image steganography","author":"morkel","year":"0","journal-title":"Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054033"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1022594.1022597"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37352-8_32"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958299"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00119"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"ref31","first-page":"127","article-title":"Hiding Secret Messages in Images: Suitability of Different Image File Types","author":"din","year":"2007","journal-title":"International Journal of Transactions on Computer"},{"key":"ref30","first-page":"4214","article-title":"Data Analysis and Study Of Various Image Stegnography Techniques Used For Data Hiding","volume":"7","author":"bartere","year":"2020","journal-title":"Critical Review"},{"key":"ref11","article-title":"A brief survey on deep learning-based data hiding, steganography and watermarking","author":"zhang","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22603-8_34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3382772"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1167\/8.9.7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8406-6_67"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1797\/1\/012015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-03728-z"},{"key":"ref39","article-title":"A Steganographic Scheme for Secure Communications Based on the Chaos and euler Theorem","volume":"6","author":"sung","year":"2004","journal-title":"IEEE Transactions on Multimedia"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.48161\/qaj.v1n2a50"},{"journal-title":"Data Hiding Current Status and Key Issues","year":"2007","author":"wu","key":"ref38"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/ima.22406"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10064-018-1419-y"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107481"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905358"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091500"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09129-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09968-0"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT50816.2021.9358679"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06393-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7217-0"},{"key":"ref44","article-title":"The capability of image in hiding a secret message","author":"din","year":"0","journal-title":"Proceedings of the 6 International Conference on Signal Speech and Image Processing (SSIP) Portugal"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08476-2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v12.i1.pp233-238"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09519-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10217-9"},{"journal-title":"Improving Security for Video Watermarking","year":"2021","author":"gupta","key":"ref29"},{"key":"ref8","article-title":"An Overview of Steganography: Data Hiding Technique","author":"pareek","year":"2020","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09720-w"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2019.1699454"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2881118"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2018.8440965"},{"key":"ref6","first-page":"8887","article-title":"Review of the Literature on the Steganography Concept","volume":"975","author":"sahin","year":"2021","journal-title":"International Journal of Computer Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100316"},{"key":"ref40","article-title":"An analysis of LSB & DCT based steganography","volume":"10","author":"walia","year":"2010","journal-title":"Global Journal of Computer Science and Technology"}],"event":{"name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","start":{"date-parts":[[2023,8,25]]},"location":"Penang, Malaysia","end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256260\/10256269\/10256390.pdf?arnumber=10256390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:51:37Z","timestamp":1697478697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/icsecs58457.2023.10256390","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}