{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T09:26:14Z","timestamp":1759483574336,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T00:00:00Z","timestamp":1458604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,22]]},"DOI":"10.1145\/2896387.2896408","type":"proceedings-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T13:54:08Z","timestamp":1461333248000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Detection Of URL In Image Steganography"],"prefix":"10.1145","author":[{"given":"Moudhi M.","family":"Aljamea","sequence":"first","affiliation":[{"name":"Department of Informatics, Kings College London, WC2R 2LS, London"}]},{"given":"Costas S.","family":"Iliopoulos","sequence":"additional","affiliation":[{"name":"Department of Informatics, Kings College London, WC2R 2LS, London"}]},{"given":"M.","family":"Samiruzzaman","sequence":"additional","affiliation":[{"name":"Department of Informatics, Kings College London, WC2R 2LS, London"}]}],"member":"320","published-online":{"date-parts":[[2016,3,22]]},"reference":[{"issue":"3","key":"e_1_3_2_1_1_1","first-page":"191","article-title":"An introduction to steganography methods","volume":"1","author":"Hariri M.","year":"2011","journal-title":"World Applied Programming"},{"key":"e_1_3_2_1_2_1","unstructured":"R. Krenn \"Steganography and steganalysis \" Retrieved September vol. 8 p. 2007 2004.  R. Krenn \"Steganography and steganalysis \" Retrieved September vol. 8 p. 2007 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.10029"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"volume-title":"Xiao steganography. {Online}. Available: http:\/\/xiao-steganography.en.softonic.com\/","year":"2015","key":"e_1_3_2_1_6_1"},{"issue":"2","key":"e_1_3_2_1_7_1","article-title":"A review on current methods and application of digital image steganography","volume":"2","author":"Mohapatra C.","year":"2015","journal-title":"International Journal of Multidisciplinary Approach & Studies"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"An overview of image steganography","author":"Morkel T.","year":"2005","journal-title":"ISSA"},{"key":"e_1_3_2_1_9_1","first-page":"52","volume-title":"2012 3rd National Conference on. IEEE","author":"Chanu Y. J.","year":"2012"},{"key":"e_1_3_2_1_10_1","unstructured":"O. K. E. Satir \"A distortionless image steganography method via url \" in The 7th International Conference Information Security and Cryptology 2014.  O. K. E. Satir \"A distortionless image steganography method via url \" in The 7th International Conference Information Security and Cryptology 2014."},{"volume-title":"Stegoloader: A stealthy information stealer. {Online}. Available: http:\/\/www.secureworks.com\/cyber-threat-intelligence\/threats\/stegoloader-a-stealthy-information-stealer\/","year":"2015","author":"Intelligence D. S. C. T. U. T.","key":"e_1_3_2_1_11_1"},{"volume-title":"Malware analysis of the lurk downloader. {Online}. Available: http:\/\/www.secureworks.com\/cyber-threat-intelligence\/threats\/malware-analysis-of-the-lurk-downloader\/?view=Standard","year":"2014","author":"Brett Stone-Gross D. S. C. T. U.","key":"e_1_3_2_1_12_1"},{"volume-title":"List of top-level domains. https:\/\/www.icann.org\/resources\/pages\/tlds-2012-02-25-en. {Online}. Available: https:\/\/www.icann.org\/resources\/pages\/tlds-2012-02-25-en","year":"2016","author":"ICANN.","key":"e_1_3_2_1_13_1"},{"volume-title":"Radix sorts. {Online}. Available: https:\/\/www.cs.princeton.edu\/~rs\/AlgsDS07\/18RadixSort.pdf","year":"2014","author":"Sedgewick R.","key":"e_1_3_2_1_14_1"}],"event":{"name":"ICC '16: International Conference on Internet of things and Cloud Computing","acronym":"ICC '16","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the International Conference on Internet of things and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896387.2896408","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896387.2896408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:18Z","timestamp":1750221558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896387.2896408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,22]]},"references-count":14,"alternative-id":["10.1145\/2896387.2896408","10.1145\/2896387"],"URL":"https:\/\/doi.org\/10.1145\/2896387.2896408","relation":{},"subject":[],"published":{"date-parts":[[2016,3,22]]},"assertion":[{"value":"2016-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}