{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:04Z","timestamp":1767340204298,"version":"3.41.2"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/iscit.2019.8905158","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T14:23:42Z","timestamp":1574691822000},"page":"386-391","source":"Crossref","is-referenced-by-count":5,"title":["On LSB Data Hiding in High-Definition Images Using Morphological Operations"],"prefix":"10.1109","author":[{"given":"Dang Ninh","family":"Tran","sequence":"first","affiliation":[{"name":"Blekinge Institute of Technology,Karlskrona,Sweden,SE-371 79"}]},{"given":"Hans-J\u00fcrgen","family":"Zepernick","sequence":"additional","affiliation":[{"name":"Blekinge Institute of Technology,Karlskrona,Sweden,SE-371 79"}]},{"given":"Thi My","family":"Chinh Chu","sequence":"additional","affiliation":[{"name":"Blekinge Institute of Technology,Karlskrona,Sweden,SE-371 79"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37949-9_69"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6126-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.07.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.09.050"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2013.0584"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4253-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2016.12.004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.05.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1987.4767941"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","article-title":"Edge Adaptive Image Steganography Based on LSB Matching Revisited","volume":"5","author":"luo","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"journal-title":"McGill Calibrated Colour Image Database","year":"0","key":"ref28"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801556"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1068\/p5321"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3449-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"journal-title":"Matlab Image Processing Toolbox","year":"2018","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.08.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v8i1.pp379-389"},{"journal-title":"The usc-sipi image database","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2015.09.016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"journal-title":"Digital Image Processing","year":"2002","author":"gonzalez","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"journal-title":"Laboratory for Image and Video Engineering (LIVE) Database","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859378"},{"journal-title":"MIT-Adobe FiveK Dataset","year":"0","key":"ref26"},{"key":"ref25","first-page":"97","author":"bychkovsky","year":"2011","journal-title":"Proc IEEE Conf on Computer Vision and Pattern Recognition"}],"event":{"name":"2019 19th International Symposium on Communications and Information Technologies (ISCIT)","start":{"date-parts":[[2019,9,25]]},"location":"Ho Chi Minh City, Vietnam","end":{"date-parts":[[2019,9,27]]}},"container-title":["2019 19th International Symposium on Communications and Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8896981\/8905110\/08905158.pdf?arnumber=8905158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:43:01Z","timestamp":1753900981000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8905158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iscit.2019.8905158","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}