{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:09:12Z","timestamp":1749686952057,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/itcc.2004.1286660","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"347-351 Vol.2","source":"Crossref","is-referenced-by-count":39,"title":["Significance of steganography on data security"],"prefix":"10.1109","author":[{"family":"VenkatramanS","sequence":"first","affiliation":[]},{"family":"Ajith Abraham","sequence":"additional","affiliation":[]},{"given":"M.","family":"Paprzycki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/2.511977"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1109\/5.771067","article-title":"Perceptual watermarks for images and video","author":"wolfgang","year":"1999","journal-title":"Proceedings of the IEEE"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.4655281"},{"key":"2","first-page":"51","article-title":"Prisoner's problem and the subliminal channel","author":"simmons","year":"1984","journal-title":"Advances Cryptology CRYPTO'99"},{"key":"1","article-title":"Protecting intellectual property in digital multimedia","author":"skicioglu","year":"2003","journal-title":"IEEE Computer"},{"journal-title":"Digital Image Processing","year":"2003","author":"gonzalez","key":"10"},{"journal-title":"Steganography Tools","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"5","article-title":"A communications approach to image steganography","volume":"4675","author":"girod","year":"2002","journal-title":"Proc SPIE Vol 4675 Security and Watermarking of Multimedia Contents IV"},{"journal-title":"Steganography","year":"0","author":"johnson","key":"4"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/5.687830"}],"event":{"name":"International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.","start":{"date-parts":[[2004,4,5]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2004,4,7]]}},"container-title":["International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9035\/28683\/01286660.pdf?arnumber=1286660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:56:43Z","timestamp":1497585403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1286660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/itcc.2004.1286660","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}