{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:25:02Z","timestamp":1730258702392,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/icspcs.2018.8631715","type":"proceedings-article","created":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T21:37:19Z","timestamp":1549316239000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["On the Positioning of Moderately Significant Bit Data Hiding in High-Definition Images"],"prefix":"10.1109","author":[{"given":"Dang Ninh","family":"Tran","sequence":"first","affiliation":[]},{"given":"Hans-Jurgen","family":"Zepernick","sequence":"additional","affiliation":[]},{"given":"Thi My","family":"Chinh Chu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume-title":"Qualcomm, The mobile future of extended reality (XR)","year":"2018","key":"ref1"},{"volume-title":"5G unlocks a world of opportunities","year":"2018","key":"ref2"},{"volume-title":"5G unlocks a world of opportunities - Top ten 5G use cases","year":"2018","author":"Wang","key":"ref3"},{"volume-title":"Augmented and virtual reality: The first wave of 5G killer apps","year":"2018","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IAC.2018.8780472"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566214"},{"issue":"3","key":"ref8","first-page":"288","article-title":"High capacity image steganography model","volume-title":"IEEE Proceedings of Vision, Image, and Signal Processing","volume":"147","author":"Lee"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(00)00015-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/el:20001429"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/el:20010714"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00289-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00221-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"ref15","first-page":"1199","article-title":"Transforming LSB substitution for image-based steganography in matching algorithms","volume":"26","author":"Yang","year":"2010","journal-title":"J. of Inf. Science and Engineering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2016.7805079"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INVENTIVE.2016.7824899"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CAST.2016.7914980"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2017.8275302"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2017.7934929"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/12.465317"},{"article-title":"Implementation of steganography using LSB with encryption and compressed text using TEA-LZW on Android","volume-title":"Proc. International Conference on Computer, Control, Informatics and its Applications","author":"Putra","key":"ref22"},{"issue":"5","key":"ref23","first-page":"868","article-title":"Implementation of LSB steganography and its evaluation for various file formats","volume":"2","author":"Reddy","year":"2011","journal-title":"Int. J. Advanced Networking and Applications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5120\/1057-1378"},{"volume-title":"Image-based steganography using a mobile phone","year":"2016","author":"Gafurov","key":"ref25"},{"volume-title":"LSB embedding methods on still images","year":"2010","author":"Olcay","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/el:20080522"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9351-x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2018.8587484"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9780470024065"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859378"},{"volume-title":"MATLAB and Image Processing Toolbox R2018a","year":"2018","key":"ref41"},{"volume-title":"Laboratory for Image and Video Engineering (LIVE) Database","year":"2018","key":"ref42"}],"event":{"name":"2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS)","start":{"date-parts":[[2018,12,17]]},"location":"Cairns, Australia","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8624190\/8631707\/08631715.pdf?arnumber=8631715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T19:14:11Z","timestamp":1706037251000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8631715\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icspcs.2018.8631715","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}