{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:25Z","timestamp":1750306885024,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,16]],"date-time":"2012-12-16T00:00:00Z","timestamp":1355616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,16]]},"DOI":"10.1145\/2425333.2425412","type":"proceedings-article","created":{"date-parts":[[2013,1,8]],"date-time":"2013-01-08T12:47:01Z","timestamp":1357649221000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Steganographic algorithm based on parametric discrete cosine transform"],"prefix":"10.1145","author":[{"given":"Chandrakanth","family":"Boorla","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Guwahati, India"}]},{"given":"Tanima","family":"Dutta","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Guwahati, India"}]},{"given":"Arijit","family":"Sur","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Guwahati, India"}]}],"member":"320","published-online":{"date-parts":[[2012,12,16]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/TIP.2002.807363"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/78.992138"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/18.923725"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1117\/12.465284"},{"key":"e_1_3_2_1_5_1","first-page":"340","volume-title":"Proc. 5th International Workshop on Information Hiding","author":"Farid H.","year":"2002","unstructured":"H. Farid and L. Siwei . Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines . In Proc. 5th International Workshop on Information Hiding , pages 340 -- 354 , October 2002 . H. Farid and L. Siwei. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In Proc. 5th International Workshop on Information Hiding, pages 340--354, October 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-540-30114-1_6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/TSP.2005.855393"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1288869.1288872"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/34.955109"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1117\/1.1287594"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/11922841_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.5555\/1782854.1782889"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1117\/12.696774"},{"key":"e_1_3_2_1_14_1","first-page":"24","volume-title":"Proc. 10th USENIX Security Symposium","volume":"10","author":"Provos N.","year":"2001","unstructured":"N. Provos . Defending against statistical steganalysis . In Proc. 10th USENIX Security Symposium , volume 10 , pages 24 -- 24 , 2001 . N. Provos. Defending against statistical steganalysis. In Proc. 10th USENIX Security Symposium, volume 10, pages 24--24, 2001."},{"key":"e_1_3_2_1_15_1","first-page":"154","volume-title":"Proc. 2nd International Workshop on Digital Watermarking","author":"Sallee P.","year":"2003","unstructured":"P. Sallee . Model-based steganography . In Proc. 2nd International Workshop on Digital Watermarking , pages 154 -- 167 , October 2003 . P. Sallee. Model-based steganography. In Proc. 2nd International Workshop on Digital Watermarking, pages 154--167, October 2003."},{"unstructured":"G. Salomon and D. Bryant. \"SAn Engineer's guide to Automated Testing of High-speed Interfaces.  G. Salomon and D. Bryant. \" SAn Engineer's guide to Automated Testing of High-speed Interfaces .","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/1782854.1782857"},{"key":"e_1_3_2_1_18_1","first-page":"681917","volume-title":"Proc. SPIE - Security, Steganography, and Watermarking of Multimedia Contents X","volume":"6819","author":"Solanki K.","year":"2008","unstructured":"K. Solanki , A. Sarkar , and B. Manjunath . Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis . In Proc. SPIE - Security, Steganography, and Watermarking of Multimedia Contents X , volume 6819 , pages 681917 -- 681928 , January 2008 . K. Solanki, A. Sarkar, and B. Manjunath. Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis. In Proc. SPIE - Security, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 681917--681928, January 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/ICIP.2005.1530256"},{"key":"e_1_3_2_1_20_1","first-page":"82","article-title":"Secure Steganography using Randomized Cropping. LNCS Transactions on Data Hiding and Multimedia Security","volume":"7110","author":"Sur A.","year":"2012","unstructured":"A. Sur , R. Vignesh , and J. Mukherjee . Secure Steganography using Randomized Cropping. LNCS Transactions on Data Hiding and Multimedia Security , Springer , 7110 : 82 -- 95 , February 2012 . A. Sur, R. Vignesh, and J. Mukherjee. Secure Steganography using Randomized Cropping. LNCS Transactions on Data Hiding and Multimedia Security, Springer, 7110: 82--95, February 2012.","journal-title":"Springer"},{"unstructured":"D. Upham. Steganographic algorithm JSteg.  D. Upham. Steganographic algorithm JSteg .","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/647597.731875"}],"event":{"acronym":"ICVGIP '12","name":"ICVGIP '12: The Eighth Indian Conference on Vision, Graphics and Image Processing","location":"Mumbai India"},"container-title":["Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2425333.2425412","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2425333.2425412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:41Z","timestamp":1750234721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2425333.2425412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,16]]},"references-count":22,"alternative-id":["10.1145\/2425333.2425412","10.1145\/2425333"],"URL":"https:\/\/doi.org\/10.1145\/2425333.2425412","relation":{},"subject":[],"published":{"date-parts":[[2012,12,16]]},"assertion":[{"value":"2012-12-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}