{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:09:09Z","timestamp":1729642149230,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335073","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Self-sanitization of digital images using steganography"],"prefix":"10.1109","author":[{"given":"Tayana","family":"Morkel","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.02.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865702204047"},{"key":"ref13","article-title":"Message segmentation to enhance the security of LSB image steganography","volume":"3","author":"ai-husainy","year":"2012","journal-title":"Trans"},{"key":"ref14","first-page":"595","article-title":"Maximum likelihood estimation of length of secret message embedded using &#x00B1;k steganography in spatial domain","author":"fridrich","year":"2005","journal-title":"Electronic Imaging International Society for Optics and Photonics"},{"key":"ref15","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"li","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45215-7_34"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1279","DOI":"10.1109\/ICME.2000.871000","article-title":"Steganalysis of LSB encoding in color images","volume":"3","author":"fridrich","year":"2000","journal-title":"IEEE International Conference on Multimedia and Expo"},{"article-title":"Pairs of values and the chi-squared attack","year":"2005","author":"stanley","key":"ref18"},{"key":"ref19","article-title":"Stegsecret: A simple steganalysis tool","author":"munoz","year":"0","journal-title":"stegsecret sourceforge net"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref6","article-title":"Protection of digital images using self-embedding","author":"fridrich","year":"1999","journal-title":"Symposium on Content Security and Data Hiding in Digital Media"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1022594.1022597"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.817228"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2007.03.004"},{"key":"ref2","first-page":"197","article-title":"Towards redaction of digital information from electronic devices","author":"manes","year":"2007","journal-title":"Proceedings of the Conference on Digital Forensics Security and Law"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458194"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2002.1028195"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/10719724_5","article-title":"Attacks on steganographic systems","author":"westfeld","year":"2000","journal-title":"Information Hiding"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/12.465263","article-title":"Practical steganalysis of digital images - state of the art","volume":"4675","author":"fridrich","year":"2002","journal-title":"Proceedings of SPIE"},{"key":"ref21","article-title":"Image steganography and steganalysis","author":"bateman","year":"2008","journal-title":"Department of Computing Faculty of Engineering and Physical Sciences"},{"article-title":"A guide to chi-square testing","year":"1996","author":"greenwood","key":"ref23"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335073.pdf?arnumber=7335073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T20:53:43Z","timestamp":1567371223000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335073","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}