{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:04:56Z","timestamp":1729659896751,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iwcmc.2016.7577049","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T18:01:42Z","timestamp":1475172102000},"page":"150-157","source":"Crossref","is-referenced-by-count":3,"title":["A resource-efficient approach to steganography in mobile systems"],"prefix":"10.1109","author":[{"given":"Prabhat","family":"Dahal","sequence":"first","affiliation":[]},{"given":"Dongming","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yaoqing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Sharif","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Design and implementation of steganography along with secured message services in mobile phones","volume":"2","author":"mohanpriya","year":"2012","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2011.24"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379867"},{"key":"ref13","first-page":"563","article-title":"Digital watermarking by using a feature based multiwavelet fusion approach","volume":"1","author":"zhao","year":"2004","journal-title":"Canadian Conference for Electrical and Computer Engineering"},{"key":"ref14","article-title":"A robust wavelet-based watermarking algorithm using edge detection","volume":"25","author":"ellinas","year":"2007","journal-title":"Proc World Acad Sci Eng Technol"},{"key":"ref15","article-title":"Robust content based image watermarking","author":"kay","year":"2001","journal-title":"International Workshop on Image Analysis for Multimedia Interactive Services"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007963824710"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","article-title":"F5-a steganographic algorithm","author":"westfeld","year":"2001","journal-title":"Information Hiding"},{"journal-title":"CTIA-The-Wireless-Association","article-title":"CTIA-Semi-Annual Wireless Industry Survey","year":"2013","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2011.94"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2000.889233"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.850095"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2000.892268"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2002.1181227"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCYB.2010.5491253"},{"key":"ref2","first-page":"310","article-title":"Steganalysis of JPEG images: breaking the F5 algorithm","volume":"2578","author":"fridrich","year":"2002","journal-title":"Proceedings of Information Hiding Fifth International Workshop IH 2002"},{"key":"ref1","first-page":"1","article-title":"Using extended file information (EXIF) file headers in digital evidence analysis","volume":"2","author":"alvarez","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11596981_87"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCN.2012.6206858"},{"article-title":"A Study on Resource Efficient Digital Multimedia Security Measures in Mobile Devices","year":"2014","author":"prabhat","key":"ref21"}],"event":{"name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2016,9,5]]},"location":"Paphos, Cyprus","end":{"date-parts":[[2016,9,9]]}},"container-title":["2016 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7571053\/7577016\/07577049.pdf?arnumber=7577049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:00:07Z","timestamp":1498334407000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7577049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2016.7577049","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}