{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:42Z","timestamp":1750307142311,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T00:00:00Z","timestamp":1317340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100005289","name":"National Institute of Justice","doi-asserted-by":"publisher","award":["2010-DD-BX-K0392008-DD-BX-K013"],"award-info":[{"award-number":["2010-DD-BX-K0392008-DD-BX-K013"]}],"id":[{"id":"10.13039\/100005289","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000138","name":"U.S. Department of Education","doi-asserted-by":"publisher","award":["P116Z080055"],"award-info":[{"award-number":["P116Z080055"]}],"id":[{"id":"10.13039\/100000138","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005196","name":"Bureau of Justice Assistance","doi-asserted-by":"publisher","award":["2006-DD-BX-0471"],"award-info":[{"award-number":["2006-DD-BX-0471"]}],"id":[{"id":"10.13039\/100005196","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,30]]},"DOI":"10.1145\/2047456.2047466","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"61-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Undergraduate research in computer forensics"],"prefix":"10.1145","author":[{"given":"Mary","family":"DeVito","sequence":"first","affiliation":[{"name":"East Stroudsburg University, East Stroudsburg, PA"}]},{"given":"Christine","family":"Hofmeister","sequence":"additional","affiliation":[{"name":"East Stroudsburg University, East Stroudsburg, PA"}]},{"given":"Michael","family":"Jochen","sequence":"additional","affiliation":[{"name":"East Stroudsburg University, East Stroudsburg, PA"}]},{"given":"N. Paul","family":"Schembari","sequence":"additional","affiliation":[{"name":"East Stroudsburg University, East Stroudsburg, PA"}]}],"member":"320","published-online":{"date-parts":[[2011,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"National Science Foundation \"Research Experiences for Undergraduates\". Retrieved on 7 June 2011 from www.nsf.gov\/pubs\/2009\/nsf09598\/nsf09598.pdf  National Science Foundation \"Research Experiences for Undergraduates\". Retrieved on 7 June 2011 from www.nsf.gov\/pubs\/2009\/nsf09598\/nsf09598.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"National Science Foundation. \"Human Resources\". Retrieved on 7 June 2011 from www.nsf.gov\/pubs\/2008\/nsf08011\/nsf08011_5.pdf  National Science Foundation. \"Human Resources\". Retrieved on 7 June 2011 from www.nsf.gov\/pubs\/2008\/nsf08011\/nsf08011_5.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"\"Pennsylvania State System of Higher Education\". Retrieved on 7 June 2011 from www.passhe.edu  \"Pennsylvania State System of Higher Education\". Retrieved on 7 June 2011 from www.passhe.edu"},{"key":"e_1_3_2_1_4_1","unstructured":"US National Security Agency. \"National Centers for Academic Excellence in Information Assurance Education\". Retrieved on 7 June 2011 from www.nsa.gov\/ia\/academic_outreach\/nat_cae\/  US National Security Agency. \"National Centers for Academic Excellence in Information Assurance Education\". Retrieved on 7 June 2011 from www.nsa.gov\/ia\/academic_outreach\/nat_cae\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-005-5380-5"},{"key":"e_1_3_2_1_6_1","unstructured":"The Porter Stemming Algorithm. Retrieved on 29 June 2011 from http:\/\/tartarus.org\/~martin\/PorterStemmer\/.  The Porter Stemming Algorithm. Retrieved on 29 June 2011 from http:\/\/tartarus.org\/~martin\/PorterStemmer\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.60"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/44565"},{"key":"e_1_3_2_1_9_1","unstructured":"Apache Subversion. Retrieved on 29 June 2011 from http:\/\/subversion.apache.org\/.  Apache Subversion. Retrieved on 29 June 2011 from http:\/\/subversion.apache.org\/."},{"key":"e_1_3_2_1_10_1","unstructured":"TortoiseSVN. Retrieved on 29 June 2011 from http:\/\/tortoisesvn.tigris.org\/.  TortoiseSVN. Retrieved on 29 June 2011 from http:\/\/tortoisesvn.tigris.org\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Stefan Katzenbeisser and Fabien A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House. Norwood MA. 2000.   Stefan Katzenbeisser and Fabien A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking . Artech House. Norwood MA. 2000.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"e_1_3_2_1_12_1","unstructured":"David Kahn. The Code Breakers. Scribner. New York NY. 1967.  David Kahn. The Code Breakers . Scribner. New York NY. 1967."},{"key":"e_1_3_2_1_13_1","first-page":"2","article-title":"A Survey on Image Steganography and Steganalysis","volume":"2","author":"Li Bin","journal-title":"Journal of Information Hiding and Multimedia Signal Processing."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIG.2007.32"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"K. Kancherla and S. Mukkamala. \"Video Steganalysis Using Motion Estimation.\" In Proceedings of the 2009 international joint conference on Neural Networks (IJCNN'09). IEEE Press. Piscataway. 2009.   K. Kancherla and S. Mukkamala. \"Video Steganalysis Using Motion Estimation.\" In Proceedings of the 2009 international joint conference on Neural Networks (IJCNN'09) . IEEE Press. Piscataway. 2009.","DOI":"10.1109\/IJCNN.2009.5179032"},{"key":"e_1_3_2_1_16_1","unstructured":"\"FFmpeg.\" Retrieved on 24 June 2011 from http:\/\/www.ffmpeg.org\/  \"FFmpeg.\" Retrieved on 24 June 2011 from http:\/\/www.ffmpeg.org\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Brandeis University. \"The Benefits of Experiential Learning.\" Retrieved on 29 June 2011 from http:\/\/www.brandeis.edu\/experientiallearning\/forfaculty\/benefits.html  Brandeis University. \"The Benefits of Experiential Learning.\" Retrieved on 29 June 2011 from http:\/\/www.brandeis.edu\/experientiallearning\/forfaculty\/benefits.html"}],"event":{"name":"InfoSecCD '11: Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '11"},"container-title":["Proceedings of the 2011 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047466","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047456.2047466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:54Z","timestamp":1750240134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,30]]},"references-count":17,"alternative-id":["10.1145\/2047456.2047466","10.1145\/2047456"],"URL":"https:\/\/doi.org\/10.1145\/2047456.2047466","relation":{},"subject":[],"published":{"date-parts":[[2011,9,30]]},"assertion":[{"value":"2011-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}