{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:30:11Z","timestamp":1729668611241,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/ispacs.2012.6473531","type":"proceedings-article","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T18:50:57Z","timestamp":1363805457000},"page":"447-451","source":"Crossref","is-referenced-by-count":1,"title":["Re-conceptualization of applications achieved by data hiding"],"prefix":"10.1109","author":[{"given":"Mustafa S. Abdul","family":"Karim","sequence":"first","affiliation":[]},{"given":"KokSheik","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"124","article-title":"Noisy timing channels with binary inputs and outputs","author":"keye","year":"2007","journal-title":"Proceedings of the 8th International Conference on Information Hiding"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1980022.1980233"},{"key":"18","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/978-3-540-74124-4_4","article-title":"Steganographic communication in ordered channels","author":"chakinala","year":"2007","journal-title":"Proceedings of the 8th International Conference on Information Hiding"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIPA.2011.6144149"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.08.009"},{"key":"34","first-page":"1","article-title":"Reversible data embedding for any digital signal","author":"abdul karim","year":"2012","journal-title":"5th International Symposium on Communications Control and Signal Processing (ISCCSP'12)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.006"},{"key":"13","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TDSC.2005.12","article-title":"Fingerprinting relational databases: Schemes and specialties","volume":"2","author":"li","year":"2005","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.116"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.94"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190713"},{"key":"21","article-title":"Secret agent radio: Covert communication thgough dirty constellations","author":"dutta","year":"2012","journal-title":"Proceedings of the 14th International Conference on Information Hiding"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74124-4_5"},{"journal-title":"Technyou Science Educatin Source","year":"0","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.030"},{"key":"24","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/3-540-36415-3_24","article-title":"Hiding data in dna","author":"shimanovsky","year":"2003","journal-title":"Revised Papers from the 5th International Workshop on Information Hiding"},{"key":"25","first-page":"2166","article-title":"Code for encryption hiding data into genomic dna of living organisms","author":"jiao","year":"2008","journal-title":"9th International Conference on Signal Processing"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP.2011.6108981"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1202344109"},{"journal-title":"Intellectual Property Management and Protection for Multimedia Content","year":"2009","author":"alberti","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2011.6146110"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190742"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5373764"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190668"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2128309"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926097"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"6","first-page":"666","article-title":"Electronic watermark","author":"van schyndel","year":"1993","journal-title":"Proceedings of DICTA-93"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2035227"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935180"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.921733"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2181342"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.226"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1147\/sj.352.0172"}],"event":{"name":"2012 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2012)","start":{"date-parts":[[2012,11,4]]},"location":"Tamsui, New Taipei City, Taiwan","end":{"date-parts":[[2012,11,7]]}},"container-title":["2012 International Symposium on Intelligent Signal Processing and Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6470430\/6473441\/06473531.pdf?arnumber=6473531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,12]],"date-time":"2022-02-12T00:14:50Z","timestamp":1644624890000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6473531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ispacs.2012.6473531","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}