{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:00Z","timestamp":1750307100729,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393328","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"671-675","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Implementation of Least Significant Bit Steganography and statistical steganalysis"],"prefix":"10.1145","author":[{"given":"V. Lokeswara","family":"Reddy","sequence":"first","affiliation":[{"name":"K.S.R.M. College of Engg., Y. S. R. Dist., A. P.(INDIA)"}]},{"given":"A.","family":"Subramanyam","sequence":"additional","affiliation":[{"name":"AITS, Rajampet, Y. S. R. Dist., A. P. (INDIA)"}]},{"given":"P. Chenna","family":"Reddy","sequence":"additional","affiliation":[{"name":"JNTUCE, Pulivendula, Y. S. R. Dist., A. P. (INDIA)"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"the free encyclopedia\" Internet: http:\/\/en.wikipedia.org\/wiki\/Steganography, {June","author":"Steganography","year":"2012","unstructured":"\" Steganography - Wikipedia , the free encyclopedia\" Internet: http:\/\/en.wikipedia.org\/wiki\/Steganography, {June , 2012 }. \"Steganography- Wikipedia, the free encyclopedia\" Internet: http:\/\/en.wikipedia.org\/wiki\/Steganography, {June, 2012}."},{"key":"e_1_3_2_1_2_1","volume-title":"Principles and Practicies","author":"William Stallings","year":"2003","unstructured":"William Stallings , \"Cryptography and Network Security , Principles and Practicies \", 3 rd Edition. Prentice Hall 2003 , ISBN81-7808-902-5. William Stallings, \"Cryptography and Network Security, Principles and Practicies\", 3rd Edition. Prentice Hall 2003, ISBN81-7808-902-5.","edition":"3"},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"59","article-title":"Steganalaysis Method for LSB Replacement Based on Local Gradient of Image Histogram","volume":"4","author":"Madhave Sh.","year":"2008","unstructured":"M. Madhave , Sh. Samavi , N. Zakeer and M. Modarres-Hashemi . \" Steganalaysis Method for LSB Replacement Based on Local Gradient of Image Histogram \" IEEE , Vol. 4 , No. 3 , pp. 59 -- 70 , July 2008 . M. Madhave, Sh. Samavi, N. Zakeer and M. Modarres-Hashemi. \"Steganalaysis Method for LSB Replacement Based on Local Gradient of Image Histogram\" IEEE, Vol.4, No.3, pp. 59--70, July 2008.","journal-title":"IEEE"},{"key":"e_1_3_2_1_4_1","volume-title":"Johnson and Sushil Jajodia, \"Exploring Steganography: Seeing the Unseen\" IEEE transactions on Computing Practices","author":"Neil F.","year":"1998","unstructured":"Neil F. Johnson and Sushil Jajodia, \"Exploring Steganography: Seeing the Unseen\" IEEE transactions on Computing Practices , 1998 . Neil F. Johnson and Sushil Jajodia, \"Exploring Steganography: Seeing the Unseen\" IEEE transactions on Computing Practices, 1998."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2010.02.003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0730-725X(93)90205-R"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022594.1022597"},{"key":"e_1_3_2_1_8_1","first-page":"61","volume-title":"Proceedings of Information Hiding, Third International workshop","author":"Westfield A.","year":"1999","unstructured":"A. Westfield , A. Pfitzman , \"Attacks on steganographic systems \", Proceedings of Information Hiding, Third International workshop , Dresden, Germany , pp. 61 -- 75 , October 1999 . A. Westfield, A. Pfitzman, \"Attacks on steganographic systems\", Proceedings of Information Hiding, Third International workshop, Dresden, Germany, pp. 61--75, October 1999."}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:52Z","timestamp":1750239292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":8,"alternative-id":["10.1145\/2393216.2393328","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393328","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}