{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:00Z","timestamp":1750307100959,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393312","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"575-579","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Stationary wavelet transform based audio authentication technique"],"prefix":"10.1145","author":[{"given":"Tanmay","family":"Bhattacharya","sequence":"first","affiliation":[{"name":"JIS College of Engineering, West Bengal, India"}]},{"given":"Sirshendu","family":"Hore","sequence":"additional","affiliation":[{"name":"Hooghly Engineering &amp; Technology College, Hooghly, West Bengal, India"}]},{"given":"Nilanjan","family":"Dey","sequence":"additional","affiliation":[{"name":"JIS College of Engineering, West Bengal, India"}]},{"given":"S. R. B.","family":"Chaudhuri","sequence":"additional","affiliation":[{"name":"Bengal Engineering and Science University, Howrah, West Bengal, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"6","volume":"2002","author":"Rey Christian","year":"2002","unstructured":"Christian Rey , Jean-Luc Dugelay , \" A Survey of Watermarking Algorithms for Image Authentication\" , EURASIP Journal on Applied Signal Processing. Volume 2002 ( 2002 ), Issue 6 , Pages 613--621. Christian Rey, Jean-Luc Dugelay, \"A Survey of Watermarking Algorithms for Image Authentication\", EURASIP Journal on Applied Signal Processing. Volume 2002 (2002), Issue 6, Pages 613--621.","journal-title":"EURASIP Journal on Applied Signal Processing."},{"key":"e_1_3_2_1_2_1","first-page":"9","volume-title":"Ninth European Signal Processing Conference","author":"Voyatzis G.","year":"1998","unstructured":"G. Voyatzis , N. Nikolaidis , and I. Pitas . Digital watermarking: an overview. In S. Theodoridis et al., editors, Signal processing IX, theories and applications: proceedings of Eusipco-98 , Ninth European Signal Processing Conference , Rhodes, Greece, 8- -11 September 1998 , pages 9 -- 12 , Patras, Greece, 1998. Typorama Editions. G. Voyatzis, N. Nikolaidis, and I. Pitas. Digital watermarking: an overview. In S. Theodoridis et al., editors, Signal processing IX, theories and applications: proceedings of Eusipco-98, Ninth European Signal Processing Conference, Rhodes, Greece, 8--11 September 1998, pages 9--12, Patras, Greece, 1998. Typorama Editions."},{"key":"e_1_3_2_1_3_1","first-page":"709","volume-title":"Proceeding of 3rd IEEE-International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business","author":"Han Vidysagar","year":"2005","unstructured":"Potdar, Vidysagar and Han , Song and Chang , Elizabeth, \"A survey of digital image watermarking techniques \", Proceeding of 3rd IEEE-International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business , pp. 709 -- 716 , Perth, WA , Aug 10, 2005 .. Potdar, Vidysagar and Han, Song and Chang, Elizabeth, \"A survey of digital image watermarking techniques\", Proceeding of 3rd IEEE-International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, pp. 709--716, Perth, WA, Aug 10, 2005.."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Chan C. K. and Cheng L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition 37:469--474.  Chan C. K. and Cheng L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition 37:469--474.","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.817598"},{"key":"e_1_3_2_1_6_1","volume-title":"International Journal of Applied Science and Engineering","author":"Hung-Ju Lin Po-Yueh","year":"2006","unstructured":"Po-Yueh Chen* and Hung-Ju Lin , \" A DWT Based Approach for Image Steganography\" , International Journal of Applied Science and Engineering 2006 . 4, 3: 275--290 Po-Yueh Chen* and Hung-Ju Lin, \"A DWT Based Approach for Image Steganography\", International Journal of Applied Science and Engineering 2006. 4, 3: 275--290"},{"issue":"4","key":"e_1_3_2_1_7_1","volume":"7","author":"Al-Ataby Ali","year":"2010","unstructured":"Ali Al-Ataby and Fawzi Al-Naima , \" A Modified High Capacity Image Steganography Technique Based on Wavelet Transform\" , The International Arab Journal of Information Technology , Vol. 7 , No. 4 , October 2010 Ali Al-Ataby and Fawzi Al-Naima, \"A Modified High Capacity Image Steganography Technique Based on Wavelet Transform\", The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010","journal-title":"The International Arab Journal of Information Technology"},{"key":"e_1_3_2_1_8_1","volume-title":"July","author":"Kaur Blossom","year":"2011","unstructured":"Blossom Kaur , Amandeep Kaur , Jasdeep Singh , \" Steganographic Approach for Hiding Image in DCT Domain\" , International Journal of Advances in Engineering & Technology , July 2011 . Blossom Kaur, Amandeep Kaur, Jasdeep Singh, \"Steganographic Approach for Hiding Image in DCT Domain\", International Journal of Advances in Engineering & Technology, July 2011."},{"key":"e_1_3_2_1_9_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Stationary_wavelet_transform  http:\/\/en.wikipedia.org\/wiki\/Stationary_wavelet_transform"},{"volume-title":"International Journal of Modern Engineering Research","author":"Bhattacharya Tanmay","key":"e_1_3_2_1_10_1","unstructured":"Tanmay Bhattacharya , Nilanjan Dey , S. R. Bhadra Chaudhuri , \" A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum\" , International Journal of Modern Engineering Research , Vol. 1 , Issue 1, pp- 157--161 Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri, \"A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum\", International Journal of Modern Engineering Research, Vol.1, Issue1, pp- 157--161"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:52Z","timestamp":1750239292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":10,"alternative-id":["10.1145\/2393216.2393312","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393312","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}