{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:18Z","timestamp":1750306278765,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905196","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Improvement"],"prefix":"10.1145","author":[{"given":"Prutha","family":"Bhalde","sequence":"first","affiliation":[{"name":"Student ME, Jawaharlal Neheru Engineering College, Aurangabad, Maharashtra"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"volume-title":"International Journal of Advanced Research in Computer Science and Software Engineering","year":"2013","author":"Kumar Anil","key":"e_1_3_2_1_1_1"},{"volume-title":"International Journal of Computer Applications (0975-8887)","year":"2013","author":"Chadha Ankit","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Ch. Rupa P. S Avadhani E. Srinivas Reddy An efficient security approach using PGE And parity coding international Journal of Distributed and Parallel Systems (IJDPS) Vol. 3 No. 6 November 2012.  Ch. Rupa P. S Avadhani E. Srinivas Reddy An efficient security approach using PGE And parity coding international Journal of Distributed and Parallel Systems (IJDPS) Vol. 3 No. 6 November 2012.","DOI":"10.5121\/ijdps.2012.3610"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/950787.950996"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Fatiha Djebbar and Beghdad Ayad and Karim Abed Meraim and Habib Hamam Comparative Study of Digital Audio Steganography Techniques EURASIP journal on audio speech and music processing Oct 2012.  Fatiha Djebbar and Beghdad Ayad and Karim Abed Meraim and Habib Hamam Comparative Study of Digital Audio Steganography Techniques EURASIP journal on audio speech and music processing Oct 2012.","DOI":"10.1186\/1687-4722-2012-25"},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"2","article-title":"Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach","volume":"9","author":"Nehru Gunjan","year":"2012","journal-title":"IJCSI International Journal of Computer Science Issues"},{"volume-title":"International Journal of Advanced Research in Computer Science and Software Engineering","year":"2014","author":"Kaur Kamalpreet","key":"e_1_3_2_1_7_1"},{"volume-title":"International Conference on Recent Trends in Computational Methods, Communication and Controls (ICON3C","year":"2012","author":"Sakthisudhan K.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Masoud Nosrati Ronak Karimi Mehdi Hariri Audio Steganography: A Survey on Recent0020Approaches World Applied Programming Vol (2) No (3) March 2012.  Masoud Nosrati Ronak Karimi Mehdi Hariri Audio Steganography: A Survey on Recent0020Approaches World Applied Programming Vol (2) No (3) March 2012."},{"volume-title":"International Journal of Advanced Research in Computer and Communication Engineering","year":"2014","author":"Gupta Nishu","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","article-title":"Ram Mohan Reddy, Hiding Text in Audio using Multiple LSB Steganography and provide Security using Cryptography","author":"Divya S.S.","year":"2012","journal-title":"International Journal of Scientific and Technology Research"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Yan Diqun Wang Rangding Zhang Liguang Quantization step parity-based Steganography for MP3 Audio IOS Press Fundamenta informaticae 97 2009.   Yan Diqun Wang Rangding Zhang Liguang Quantization step parity-based Steganography for MP3 Audio IOS Press Fundamenta informaticae 97 2009.","DOI":"10.3233\/FI-2009-190"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905196"}},"subtitle":["Audio Steganography Technique Parity Bit Combined With Cryptography"],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":12,"alternative-id":["10.1145\/2905055.2905196","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905196","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}