{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:28:49Z","timestamp":1766068129989,"version":"3.32.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100014043","name":"Office of the Under Secretary of Defense","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014043","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/milcom61039.2024.10773753","type":"proceedings-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T18:47:40Z","timestamp":1733510860000},"page":"1094-1099","source":"Crossref","is-referenced-by-count":1,"title":["Optimization of Error Pattern Embedding Steganography within Error-Correcting Code Frameworks"],"prefix":"10.1109","author":[{"given":"Yongkyu","family":"Jang","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Minglong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Mississippi State University"}]},{"given":"Andre","family":"Kirchner","sequence":"additional","affiliation":[{"name":"Mississippi State University"}]},{"given":"Bryan A.","family":"Jones","sequence":"additional","affiliation":[{"name":"Mississippi State University"}]},{"given":"Vuk","family":"Marojevic","sequence":"additional","affiliation":[{"name":"Mississippi State University"}]},{"given":"Taejoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"David J.","family":"Love","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3251888"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/10719724_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921684"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2007.369349"},{"issue":"05","key":"ref6","first-page":"868","article-title":"Implementation of LSB steganography and its evaluation for various file formats","volume":"2","author":"Reddy","year":"2011","journal-title":"Int. J. Advanced Networking and Applications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232466"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2003.1199532"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04431-1_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597841"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"journal-title":"The art of data hiding with reed-solomon error correcting codes","year":"2014","author":"Ishengoma","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSPA53304.2022.9790782"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312388"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638198"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2509941"}],"event":{"name":"MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2024,10,28]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,11,1]]}},"container-title":["MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10773620\/10773624\/10773753.pdf?arnumber=10773753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T20:00:24Z","timestamp":1736539224000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10773753\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/milcom61039.2024.10773753","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}