{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:56:42Z","timestamp":1729641402733,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/siu.2014.6830189","type":"proceedings-article","created":{"date-parts":[[2014,6,20]],"date-time":"2014-06-20T21:51:45Z","timestamp":1403301105000},"page":"156-159","source":"Crossref","is-referenced-by-count":0,"title":["An application of fuzzy logic-based image steganography"],"prefix":"10.1109","author":[{"given":"Rukiye","family":"Karakis","sequence":"first","affiliation":[]},{"given":"Inan","family":"Guler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.05.042"},{"journal-title":"TID2008 page","year":"0","key":"22"},{"key":"17","first-page":"261","article-title":"Yapay Zeka Uygulamalar","author":"elmas","year":"2007","journal-title":"Sec?kin Yayrncilik Ankara"},{"journal-title":"Bulank Mantik","year":"0","key":"18"},{"key":"15","doi-asserted-by":"crossref","first-page":"27","DOI":"10.5815\/ijmecs.2012.06.04","article-title":"Information hiding using least significant bit steganography and cryptography","volume":"6","author":"gupta","year":"2012","journal-title":"I J Modern Education and Computer Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.5772\/36329"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2011.6095421"},{"key":"14","first-page":"535","article-title":"Study and analysis of various image steganography techniques","volume":"2","author":"kaur","year":"2011","journal-title":"International Journal of Computer Science and Technology"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958299"},{"journal-title":"Gri Seviyeli Resimler U?zerinde Rastgele LSB Yo?ntemini ve Sayi Teorisini Kullanarak Bilgi Gizleme ve Steganaliz","year":"2006","author":"s?ahin","key":"12"},{"key":"21","first-page":"4","article-title":"New full-reference quality metrics based on HVS","author":"egiazarian","year":"2006","journal-title":"Proc of the II International Workshop on VPQM"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2006.08.004"},{"key":"2","first-page":"17","article-title":"24-bit renkli resimler u?zerinde en o?nemsiz bite ekleme yo?ntemini kullanarak bilgi gizleme","volume":"7","author":"s?ahin","year":"2006","journal-title":"Trakya Univ J Sci"},{"key":"1","article-title":"Hiding secret message in edges of the images","author":"manglem singh","year":"2007","journal-title":"Information and Communication Technology Conference"},{"key":"10","first-page":"28","article-title":"A secure steganography method based on genetic algorithm","volume":"1","author":"wang","year":"2010","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"7","first-page":"107","article-title":"Imge kareleri kullanan yeni bir steganografi yo?ntemi","volume":"5","author":"kurtuldu","year":"2009","journal-title":"Journal of Naval Science and Engineering"},{"journal-title":"Resim Ic?erisindeki Gizli Bilginin RQP Steganaliz Yo?ntemiyle Sezilmesi","year":"2007","author":"s?ahin","key":"6"},{"journal-title":"Information Hiding using Steganography","year":"2003","author":"amin","key":"5"},{"journal-title":"Steganografik Yaklas?imlarin Incelenmesi Tasarimi ve Gelis?tirilmesi","year":"2007","author":"atici","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIS.2006.1703168"},{"journal-title":"A Survey of Steganographic Techniques","year":"0","author":"johnson","key":"8"}],"event":{"name":"2014 22nd Signal Processing and Communications Applications Conference (SIU)","start":{"date-parts":[[2014,4,23]]},"location":"Trabzon, Turkey","end":{"date-parts":[[2014,4,25]]}},"container-title":["2014 22nd Signal Processing and Communications Applications Conference (SIU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820096\/6830164\/06830189.pdf?arnumber=6830189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T11:19:25Z","timestamp":1498130365000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6830189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/siu.2014.6830189","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}