{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:21:54Z","timestamp":1729617714460,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscisc.2014.6994020","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T22:11:01Z","timestamp":1419977461000},"page":"44-48","source":"Crossref","is-referenced-by-count":12,"title":["CVC: Chaotic visual cryptography to enhance steganography"],"prefix":"10.1109","author":[{"given":"Melika","family":"Mostaghim","sequence":"first","affiliation":[]},{"given":"Reza","family":"Boostani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Combine use of steganography and visual cryptography for secured data hiding in computer forensics","volume":"3","author":"gupta","year":"2012","journal-title":"International Journal of Computer Science and Information Technologies (IJCSIT)"},{"key":"17","article-title":"Steganography by using logistic map function and cellular automata","author":"alirezanejad","year":"2012","journal-title":"Research Journal of Applied Sciences Engineering and Technology"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35314-7_63"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-004-3816-4"},{"journal-title":"Image Watermarking Using Chaotic Watermark Scrambling and Perceptual Qu Ality Evaluation","year":"2013","author":"ye","key":"16"},{"key":"13","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-642-14298-7_5","article-title":"A comprehensive study of visual cryptography","author":"weir","year":"2010","journal-title":"Transactions on Data Hiding and Multimedia Security V"},{"key":"14","first-page":"96","article-title":"A review on visual cryptography schemes","volume":"3","author":"kiran","year":"2012","journal-title":"Journal of Global Research in Computer Science"},{"key":"11","first-page":"21","article-title":"Steganography security for copyright protection of digital images using dwt","author":"gandhe","year":"2010","journal-title":"International Journal of Computer and Network Security (IJCNS)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2010.5423005"},{"key":"21","article-title":"A survey on image steganogr aphy and steganalysis","volume":"2","author":"li","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22714-1_51"},{"key":"22","article-title":"A comprehensive review on secure image steganography","volume":"6","author":"singla","year":"2012","journal-title":"An International Science and Engineering Journal"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.346"},{"key":"24","first-page":"97","article-title":"Image encryption based on chaotic tent map in time and frequency domains","volume":"5","author":"hassani","year":"2013","journal-title":"International Journal of Information Security"},{"key":"25","article-title":"Chaotic image encryption design using tompkins-paige algorithm","author":"borujeni","year":"2009","journal-title":"Mathematical Problems in Engineering"},{"key":"3","article-title":"An overview of image steganography","author":"morkel","year":"2005","journal-title":"Proceedings of the Information Security South Africa (ISSA) Conference"},{"key":"2","article-title":"An overview of steganography","author":"dickman","year":"2007","journal-title":"James Mad Ison University Infosec Techreport Department of Computer Science"},{"key":"10","article-title":"A modified high capacity image steganography technique based on wavelet transform","author":"al-ataby","year":"2010","journal-title":"The International Arab Journal of Information Technology"},{"key":"1","article-title":"An overview of digital image steganography","volume":"4","author":"poornima","year":"2013","journal-title":"International Journal of Computer Science &amp; Engineering Survey"},{"key":"7","article-title":"A survey on image steganography and stegana lysis","volume":"2","author":"li","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"Visual cryptography","author":"naor","year":"1995","journal-title":"Proceedings of Advances in Cryptology-EUROCRYPT"},{"key":"4","article-title":"Image steganography techniques: An overview","volume":"6","author":"hamid","year":"2012","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.03.005"},{"key":"8","article-title":"A survey of steganography and steganalysis technique i n image, text, audio and video as cover carrier","volume":"2","author":"bhattacharyya","year":"2011","journal-title":"Journal of Global Research in Computer Science"}],"event":{"name":"2014 11th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2014,9,3]]},"location":"Tehran, Iran","end":{"date-parts":[[2014,9,4]]}},"container-title":["2014 11th International ISC Conference on Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975720\/6994006\/06994020.pdf?arnumber=6994020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:54:41Z","timestamp":1498172081000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6994020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2014.6994020","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}