{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:36:59Z","timestamp":1757540219227,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905176","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A DWT based Attack Resistant Video Steganography"],"prefix":"10.1145","author":[{"given":"Shikha","family":"Sharma","sequence":"first","affiliation":[{"name":"Poornima College of Engineering, Jaipur, India"}]},{"given":"Devendra","family":"Somwanshi","sequence":"additional","affiliation":[{"name":"Poornima College of Engineering, Jaipur, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"2008","article-title":"A discrete wavelet transform based technique for image data hiding","author":"Hassaan L.A","year":"2008","unstructured":"Hassaan , L.A , Abdelwahab , A.A. , 2008 , \" A discrete wavelet transform based technique for image data hiding ,\" Radio Science Conference, page No. 1 ,9, 18-20 March 2008 Hassaan, L.A, Abdelwahab, A.A., 2008, \"A discrete wavelet transform based technique for image data hiding,\" Radio Science Conference, page No. 1,9, 18-20 March 2008","journal-title":"Radio Science Conference, page"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2013.85"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"IEEE Region 10 Conference","author":"Raja K.B.","year":"2008","unstructured":"Raja , K.B. ; Babu , K.S. ; Kiran , K.K. ; Manjula Devi , T.H. ; Venugopal , K.R. ; Patnaik , L.M. , 2008 , \" Authentication of secret information in image Steganography,\" TENCON 2008 , IEEE Region 10 Conference , pp. 1 ,6, 19-21 Nov. 2008 Raja, K.B.; Babu, K.S.; Kiran, K.K.; Manjula Devi, T.H.; Venugopal, K.R.; Patnaik, L.M., 2008, \"Authentication of secret information in image Steganography,\" TENCON 2008, IEEE Region 10 Conference, pp. 1,6, 19-21 Nov. 2008"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Banglore","author":"Balakrishna C.","year":"2014","unstructured":"Balakrishna C. ; Naveen Chandra V. ; Pal R. ; 2014 , \" Image Steganography Using Single Digit Sum with Varying Base\", \"IEEE international conference on Electronics, computing and communication Technologies \", Banglore , 2014, page no 1 -- 5 . Balakrishna C.; Naveen Chandra V.; Pal R.; 2014, \"Image Steganography Using Single Digit Sum with Varying Base\", \"IEEE international conference on Electronics, computing and communication Technologies\", Banglore, 2014, page no 1--5."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"2011 IEEE International Conference on, vol., no.","author":"Balaji R.","year":"2011","unstructured":"Balaji , R. ; Naveen , G. , \" Secure data transmission using video Steganography,\" Electro\/Information Technology (EIT) , 2011 IEEE International Conference on, vol., no. , page No. 1 - 5 , 15-17 May 2011 Balaji, R.; Naveen, G., \"Secure data transmission using video Steganography,\" Electro\/Information Technology (EIT), 2011 IEEE International Conference on, vol., no., page No. 1-5, 15-17 May 2011"},{"key":"e_1_3_2_1_6_1","volume-title":"2248--9622","author":"Bhautmage P.","year":"2013","unstructured":"Bhautmage P. ; Jeyakumar A. ; Dahatonde A. ;2013, \" Advanced Video Steganography Algorithm \", \" International Journal of Engineering Research and Applications (IJERA)\", ISSN : 2248--9622 , Vol. 3 , Issue 1, February 2013 , Bhautmage P.; Jeyakumar A.; Dahatonde A.;2013, \"Advanced Video Steganography Algorithm\", \"International Journal of Engineering Research and Applications (IJERA)\", ISSN: 2248--9622, Vol. 3, Issue 1, February 2013,"},{"key":"e_1_3_2_1_7_1","first-page":"2035","volume-title":"IEEE 2nd International Conference on Consumer Electronics, Communications and Networks","author":"ChunyingGu","year":"2012","unstructured":"ChunyingGu , Xiaoli Cao , 2012 , \" Research on Information Hiding Technology \", IEEE 2nd International Conference on Consumer Electronics, Communications and Networks , pp. 2035 -- 2037 , April 2012. ChunyingGu, Xiaoli Cao, 2012, \"Research on Information Hiding Technology\", IEEE 2nd International Conference on Consumer Electronics, Communications and Networks, pp. 2035--2037, April 2012."},{"key":"e_1_3_2_1_8_1","unstructured":"Gupta Banik B.; Bandyopadhyay S.; 2013 \"A DWT method for Image Steganography\" \"International journal of Advanced Research in computer science and software Engineering\" Gupta Banik B.; Bandyopadhyay S.; 2013 \"A DWT method for Image Steganography\" \"International journal of Advanced Research in computer science and software Engineering\""},{"key":"e_1_3_2_1_9_1","unstructured":"Kajewski S and Weippert A 2004 \"E-Tendering: Benefits Challenges and Recommendations for Practice\". \"In Proceedings CRCCI International Conference: Clients Driving innovation\" Kajewski S and Weippert A 2004 \"E-Tendering: Benefits Challenges and Recommendations for Practice\". \"In Proceedings CRCCI International Conference: Clients Driving innovation\""},{"key":"e_1_3_2_1_10_1","unstructured":"Raphasel A.j.; Dr. Sumdaram V.; \"Cryptography and Steganography -- A Survey\" \"International Journal of computer Technology and Application\" vol 2(3) 626--630 Raphasel A.j.; Dr. Sumdaram V.; \"Cryptography and Steganography -- A Survey\" \"International Journal of computer Technology and Application\" vol 2(3) 626--630"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2009.52"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.391"},{"key":"e_1_3_2_1_13_1","first-page":"709","volume-title":"Science and Management (ICAESM), vol., no","author":"Ghosh S.","year":"2012","unstructured":"Ghosh , S. ; Nag , A. ; Biswas , S. ; Sarkar , D. ; Sarkar , P.P. , 2012, \" An image steganography technique using X-box mapping, \" International Conference on Advances in Engineering , Science and Management (ICAESM), vol., no ., pp. 709 -- 713 , 30-31 March 2012 Ghosh, S.; Nag, A.; Biswas, S.; Sarkar, D.; Sarkar, P.P., 2012, \"An image steganography technique using X-box mapping, \"International Conference on Advances in Engineering, Science and Management (ICAESM), vol., no., pp. 709--713, 30-31 March 2012"},{"key":"e_1_3_2_1_14_1","first-page":"173","article-title":"Implementation of LSB Steganography and Its Evaluation for Various Bits","author":"Jacobs D.","year":"2006","unstructured":"Jacobs , D. , Neeta , D. ; Snehal , K. ; 2006 , \" Implementation of LSB Steganography and Its Evaluation for Various Bits ,\" 1st International Conference on Digital Information Management , vol., no., pp. 173 -- 178 , 6-8 Dec. 2006 Jacobs, D., Neeta, D.; Snehal, K.; 2006, \"Implementation of LSB Steganography and Its Evaluation for Various Bits,\" 1st International Conference on Digital Information Management, vol., no., pp. 173--178, 6-8 Dec. 2006","journal-title":"1st International Conference on Digital Information Management"},{"key":"e_1_3_2_1_15_1","volume-title":"Issue: 2, 72--75","author":"Sirsendusarbavidya","year":"2012","unstructured":"Sirsendusarbavidya , Sunil Karforma, 2012, \"UML implementation of E- Tendering using Secret Key Digital Watermarking\" , International Journal of Computer and Distributed System Volume: 1 , Issue: 2, 72--75 , 2012 Sirsendusarbavidya, Sunil Karforma, 2012, \"UML implementation of E-Tendering using Secret Key Digital Watermarking\", International Journal of Computer and Distributed System Volume: 1, Issue: 2, 72--75, 2012"},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Computational Intelligence and Computing Research\"","author":"Yadav P.","year":"2013","unstructured":"Yadav P. ; Mishra N. ; Sharma S. ; \"A Secure Video Steganography with Encryption Based on LSB Technique \", \"IEEE International Conference on Computational Intelligence and Computing Research\" , 2013 Yadav P.; Mishra N.; Sharma S.; \"A Secure Video Steganography with Encryption Based on LSB Technique\", \"IEEE International Conference on Computational Intelligence and Computing Research\", 2013"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Jianyu Zhao; Weilin Wang; Xing Chang; Li Zhang 2011 \"A survey of digital video watermarking \" Seventh International Conference on Natural Computation (ICNC) 2011 vol. 1 no. pp. 61 65 26-28 July 2011 Jianyu Zhao; Weilin Wang; Xing Chang; Li Zhang 2011 \"A survey of digital video watermarking \" Seventh International Conference on Natural Computation (ICNC) 2011 vol. 1 no. pp. 61 65 26-28 July 2011","DOI":"10.1109\/ICNC.2011.6022111"},{"key":"e_1_3_2_1_18_1","unstructured":"Jilani S.A.K; Swathi A.; 2012 \"Video steganography by LSB substitution using different polynomial equation\" International journal of computational engineering research (IJCER) 2012 vol. 2 issue. 5 Jilani S.A.K; Swathi A.; 2012 \"Video steganography by LSB substitution using different polynomial equation\" International journal of computational engineering research (IJCER) 2012 vol. 2 issue. 5"},{"key":"e_1_3_2_1_19_1","unstructured":"Suneetha B.; HimaBindu Ch.; Sarth Chandra S.; 2013 \"Secured data transmission based video Steganography\" International journal of mechanical and production engineering(IJMPE) 2013 vol.-2 ISS-1 Suneetha B.; HimaBindu Ch.; Sarth Chandra S.; 2013 \"Secured data transmission based video Steganography\" International journal of mechanical and production engineering(IJMPE) 2013 vol.-2 ISS-1"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905176","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905176"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":19,"alternative-id":["10.1145\/2905055.2905176","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905176","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}