{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:41:32Z","timestamp":1730284892703,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/ncvpripg.2015.7490047","type":"proceedings-article","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T22:26:18Z","timestamp":1465856778000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive crypto-steganosystem for videos based on information content and visual perception"],"prefix":"10.1109","author":[{"given":"Prerana","family":"Mukherjee","sequence":"first","affiliation":[]},{"given":"Siddharth","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Brejesh","family":"Lall","sequence":"additional","affiliation":[]},{"given":"Saisha","family":"Asolkar","sequence":"additional","affiliation":[]},{"given":"Meera","family":"Pai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.05.040"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.06.003"},{"year":"0","key":"ref10","article-title":"Phash: the open source perceptual hash library"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IVCNZ.2013.6727053"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202577"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2011.06.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206596"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1167\/8.7.32"},{"key":"ref2","first-page":"1","article-title":"Video steganography: a comprehensive review","author":"sadek","year":"2014","journal-title":"Multimedia Tools and Applications"},{"key":"ref9","article-title":"Implementation and benchmarking of perceptual image hash functions","volume":"43","author":"zauner","year":"2010"},{"key":"ref1","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"li","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"}],"event":{"name":"2015 Fifth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","start":{"date-parts":[[2015,12,16]]},"location":"Patna, India","end":{"date-parts":[[2015,12,19]]}},"container-title":["2015 Fifth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484379\/7489934\/07490047.pdf?arnumber=7490047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T20:51:03Z","timestamp":1489783863000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7490047\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ncvpripg.2015.7490047","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}