{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:06:32Z","timestamp":1729638392643,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/icsipa.2013.6708029","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T15:06:33Z","timestamp":1389366393000},"page":"337-342","source":"Crossref","is-referenced-by-count":7,"title":["High security image steganography using IWT and graph theory"],"prefix":"10.1109","author":[{"given":"V","family":"Thanikaiselvan","sequence":"first","affiliation":[]},{"given":"P","family":"Arulmozhivarman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.5120\/7454-0458"},{"key":"17","first-page":"377","article-title":"Advanced Wavelet Based Steganography for Colored Images","author":"gholamrezaei","year":"0","journal-title":"Proc International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) 2010"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.30"},{"key":"15","first-page":"11","article-title":"An Adaptive Steganographic Technique Based on Integer Wavelet Transform","author":"safy","year":"0","journal-title":"Proc ICNM 2009"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCET.2011.5762459"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926097"},{"key":"14","first-page":"445","article-title":"Lossless Data Hiding based on Histogram Modification","volume":"9","author":"ramaswamy","year":"2012","journal-title":"International Arab Journal of Information Technology"},{"key":"11","first-page":"1594","article-title":"A New steganography for crypto cover files","volume":"5","author":"thanikaiselvan","year":"2013","journal-title":"International Journal of Engineering and Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00221-8"},{"journal-title":"Applied Cryptography Protocols Algorithm and Source Code in C","year":"2007","author":"schneier","key":"3"},{"journal-title":"Pairs of Values and the Chi-squared Attack","year":"2005","author":"stanley","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"10","first-page":"36","article-title":"Horse Riding & Hiding in Image for Data Guarding","volume":"30","author":"thanikaiselvan","year":"2012","journal-title":"Science Direct Procedia Engineering"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"6","doi-asserted-by":"crossref","first-page":"552","DOI":"10.5370\/JEET.2009.4.4.552","article-title":"A Semi-blind Digital Watermarking Scheme Based on the Triplet of Significant Wavelet Coefficients","volume":"4","author":"chu","year":"2009","journal-title":"Journal of Electrical Engineering & Technology"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.5370\/JEET.2012.7.4.646"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2012.428.439"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.01.010"}],"event":{"name":"2013 IEEE International Conference on Signal and Image Processing Applications (ICSIPA)","start":{"date-parts":[[2013,10,8]]},"location":"Melaka, Malaysia","end":{"date-parts":[[2013,10,10]]}},"container-title":["2013 IEEE International Conference on Signal and Image Processing Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6690583\/6707955\/06708029.pdf?arnumber=6708029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:50:31Z","timestamp":1498096231000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6708029\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icsipa.2013.6708029","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}