{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T06:43:19Z","timestamp":1751265799621,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/ictc.2013.6675372","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T15:58:59Z","timestamp":1386172739000},"page":"353-358","source":"Crossref","is-referenced-by-count":24,"title":["Hiding data in video sequences using steganography algorithms"],"prefix":"10.1109","author":[{"given":"Hamdy M.","family":"Kelash","sequence":"first","affiliation":[]},{"given":"Osama F.","family":"Abdel Wahab","sequence":"additional","affiliation":[]},{"given":"Osama A.","family":"Elshakankiry","sequence":"additional","affiliation":[]},{"given":"Hala S.","family":"El-sayed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Image steganography techniques : An overview","volume":"6","author":"nagham","year":"2012","journal-title":"International Journal of Computer Science and Security (IJCSS) Volume"},{"key":"11","first-page":"1","article-title":"A steganography algorithm for hiding image in image by improved lbs substitution by minimize detection","volume":"36","author":"sharma","year":"2012","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2012.2217"},{"key":"3","first-page":"213","article-title":"Arabic\/persian text steganographyutilizing similar letters with different codes","volume":"35","author":"shahreza","year":"2010","journal-title":"The Arabian Journal for Science and Engineering"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2009.0316"},{"key":"1","first-page":"455","volume":"7","author":"shanableh","year":"2012","journal-title":"Data hiding in mpeg video files using multivariate regression and flexible macroblock ordering"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.06.010"},{"key":"7","first-page":"111","article-title":"Design and implementation of image steganography","volume":"3","author":"chincholkar","year":"2012","journal-title":"Image and Signal Processing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1022594.1022597"},{"key":"5","first-page":"338","article-title":"Steganography using least signicant bit algorithm","volume":"2","author":"kavitha","year":"2012","journal-title":"International Journal of Engineering Research and Applications (IJERA) ISSN 2248-9622"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.015"},{"key":"9","first-page":"670","author":"cetiin","year":"2009","journal-title":"A New Steganography Algorithm Based on Color Histograms for Data Embedding into Raw Video Streams"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-6950-7"}],"event":{"name":"2013 International Conference on ICT Convergence (ICTC)","start":{"date-parts":[[2013,10,14]]},"location":"JEJU ISLAND, Korea (South)","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661630\/6675287\/06675372.pdf?arnumber=6675372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:39:06Z","timestamp":1490211546000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6675372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ictc.2013.6675372","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}