{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:01Z","timestamp":1750307101172,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393341","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"749-752","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure transmission of authenticated messages using new encoding scheme and Steganography"],"prefix":"10.1145","author":[{"given":"Kalavathi","family":"Alla","sequence":"first","affiliation":[{"name":"Vasireddy Venkatadri Institute of Technology, Guntur Dt, Andhra Pradesh, INDIA"}]},{"given":"G. Gowri","family":"Shankar","sequence":"additional","affiliation":[{"name":"Vasireddy Venkatadri Institute of Technology, Guntur Dt, Andhra Pradesh, INDIA"}]},{"given":"G. Bala","family":"Subrahmanyam","sequence":"additional","affiliation":[{"name":"Vasireddy Venkatadri Institute of Technology, Guntur Dt, Andhra Pradesh, INDIA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 2nd International Workshop on Digital Water Marking\"","author":"Chandramouli R","year":"2003","unstructured":"Chandramouli R , Kharrazi , M & Menon , N. , \" Image Steganography and Steganalysis : Concepts and Practice \", Proceedings of the 2nd International Workshop on Digital Water Marking\" , October 2003 . Chandramouli R, Kharrazi, M & Menon, N., \"Image Steganography and Steganalysis: Concepts and Practice\", Proceedings of the 2nd International Workshop on Digital Water Marking\", October 2003."},{"key":"e_1_3_2_1_2_1","first-page":"127","volume-title":"Computer Vision theory and applications","author":"Domenico Daniele Bloisi","unstructured":"Domenico Daniele Bloisi , Luca Iocchi: Image based Steganography and cryptography , Computer Vision theory and applications volume 1 , pp. 127 -- 134 . Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1, pp. 127--134."},{"key":"e_1_3_2_1_3_1","unstructured":"Ding W. and Marchionini G. 1997. A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.   Ding W. and Marchionini G. 1997. A Study on Video Browsing Strategies . Technical Report. University of Maryland at College Park."},{"key":"e_1_3_2_1_4_1","volume-title":"EUROCRYPT","author":"Den Boer A.","year":"1993","unstructured":"Den Boer and A. Bosselaers , Collisions for the Compression Function of MD5 . EUROCRYPT 1993 , pp293--304. Den Boer and A. Bosselaers, Collisions for the Compression Function of MD5. EUROCRYPT 1993, pp293--304."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/647598.731896"},{"key":"e_1_3_2_1_6_1","unstructured":"Emmanouel Kellinis and Konstantinos Papapanagiotou Using Steganography to Improve Hash Functions' Collision Resistance.  Emmanouel Kellinis and Konstantinos Papapanagiotou Using Steganography to Improve Hash Functions' Collision Resistance."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232466"},{"key":"e_1_3_2_1_8_1","volume-title":"BocaRaton","author":"Stinson","year":"1995","unstructured":"D. R. Stinson , Cryptography: Theory and Practice , BocaRaton , CRC Press , 1995 . D. R. Stinson, Cryptography: Theory and Practice, BocaRaton, CRC Press, 1995."},{"key":"e_1_3_2_1_9_1","volume-title":"4th information hiding workshop","author":"Fridrich M.","year":"2001","unstructured":"J. Fridrich . M. goljan and R. Du . \" distortion free data embedding for images\" proceedings . 4th information hiding workshop , Pittsburgh , Pennsylvania, April 25-27, 2001 . J. Fridrich. M.goljan and R. Du. \"distortion free data embedding for images\" proceedings. 4th information hiding workshop, Pittsburgh, Pennsylvania, April 25-27, 2001."},{"key":"e_1_3_2_1_10_1","volume-title":"SANS Institute","author":"Dunbar B.","year":"2002","unstructured":"Dunbar , B. , \" Steganography techniques and their use in an Open-Systems environment \", SANS Institute , January 2002 . Dunbar, B., \"Steganography techniques and their use in an Open-Systems environment\", SANS Institute, January 2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1992.228224"},{"key":"e_1_3_2_1_12_1","series-title":"WSPC LectureNotes Series","volume-title":"ImageSteganography: Concepts and practice","author":"Kharrazi M.","year":"2004","unstructured":"Kharrazi , M. , Sencar , H. T. , and Memon , N . ( 2004 ). ImageSteganography: Concepts and practice . In WSPC LectureNotes Series Kharrazi, M., Sencar, H. T., and Memon, N. (2004). ImageSteganography: Concepts and practice. In WSPC LectureNotes Series"},{"key":"e_1_3_2_1_13_1","volume-title":"Espoo f finland, nov","author":"Aura","year":"1995","unstructured":"T. Aura . \"an invisible communication\" in proceedings of hut seminar on network security on network security. 95. Espoo f finland, nov 1995 . T. Aura. \"an invisible communication\" in proceedings of hut seminar on network security on network security. 95. Espoo f finland, nov 1995."},{"key":"e_1_3_2_1_14_1","first-page":"25910","article-title":"How to Break MD5 and Other Hash Functions","volume":"3","author":"Xiaoyun Wang Yu.","year":"2005","unstructured":"Xiaoyun Wang ; Hongbo Yu. \" How to Break MD5 and Other Hash Functions \". EUROCRYPT. ISBN 3-540 - 25910 - 25914 , 2005 . Xiaoyun Wang; Hongbo Yu. \"How to Break MD5 and Other Hash Functions\". EUROCRYPT. ISBN3-540-25910-4, 2005.","journal-title":"EUROCRYPT. ISBN"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022594.1022597"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393341","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:52Z","timestamp":1750239292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":15,"alternative-id":["10.1145\/2393216.2393341","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393341","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}