{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:14:48Z","timestamp":1730272488029,"version":"3.28.0"},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/iscc.2008.4625605","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T19:09:41Z","timestamp":1221764981000},"page":"864-868","source":"Crossref","is-referenced-by-count":5,"title":["Pseudo-space Persian\/Arabic text steganography"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Shirali-Shahreza","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS-COMSAR.2006.10"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"journal-title":"Toward a theory of Steganography","year":"2004","author":"hopper","key":"1"},{"journal-title":"The Unicode Standard","year":"0","key":"6"},{"key":"5","first-page":"63","article-title":"persian\/arabic captcha","volume":"1","author":"shirali-shahreza","year":"2006","journal-title":"IADIS International Journal on Computer Science and Information Systems (IJCSIS)"},{"key":"4","first-page":"28","article-title":"a novel arabic text steganography method using letter points and extensions","volume":"21","author":"gutub","year":"2007","journal-title":"Proceedings of the WASET International Conference on Computer Information and Systems Science and Engineering (ICCISSE)"}],"event":{"name":"2008 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2008,7,6]]},"location":"Marrakech","end":{"date-parts":[[2008,7,9]]}},"container-title":["2008 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4607772\/4625572\/04625605.pdf?arnumber=4625605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:12:33Z","timestamp":1489767153000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4625605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/iscc.2008.4625605","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}