{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:13:19Z","timestamp":1761581599857,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T00:00:00Z","timestamp":1495152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,19]]},"DOI":"10.1145\/3093241.3093247","type":"proceedings-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T18:49:04Z","timestamp":1504291744000},"page":"167-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Novel Approach for Image Steganography based on LSB Technique"],"prefix":"10.1145","author":[{"given":"G. G.","family":"Rajput","sequence":"first","affiliation":[{"name":"Department of Computer Science, Rani Channamma University, Belagavi, India"}]},{"given":"Ramesh","family":"Chavan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Rani Channamma University, Belagavi, India"}]}],"member":"320","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"volume-title":"Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005)","year":"2005","author":"Morkel T.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Neil F. Johnson and Stefan C. Katzenbeisser Chapter-3 \"A Survey of Steganographic Techniques\" Information Hiding Techniques for Steganography and Digital Watermarking Artech House London 2000  Neil F. Johnson and Stefan C. Katzenbeisser Chapter-3 \"A Survey of Steganographic Techniques\" Information Hiding Techniques for Steganography and Digital Watermarking Artech House London 2000"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Abbas Cheddad Joan Condell Kevin Curran Paul Mc Kevitt \"Digital image steganography: Survey and analysis of current methods\" - Signal processing 2010 - Elsevier 727--752  Abbas Cheddad Joan Condell Kevin Curran Paul Mc Kevitt \"Digital image steganography: Survey and analysis of current methods\" - Signal processing 2010 - Elsevier 727--752","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"e_1_3_2_1_4_1","unstructured":"Ajit Danti Preethi Acharya \"Randomised Embedding scheme based on DCT Coefficients For Image Steganography\". IJCA Special Issue on \"Recent Trends in image Processing and Pattern Recognition \"RTIPPR 2010  Ajit Danti Preethi Acharya \"Randomised Embedding scheme based on DCT Coefficients For Image Steganography\". IJCA Special Issue on \"Recent Trends in image Processing and Pattern Recognition \"RTIPPR 2010"},{"key":"e_1_3_2_1_5_1","unstructured":"K.P.Adhiya Swati.A.Patil \"Hiding Text in Audio Using LSB Based Steganography\" Information and Knowledge Management Vol 2. No 3. 2012  K.P.Adhiya Swati.A.Patil \"Hiding Text in Audio Using LSB Based Steganography\" Information and Knowledge Management Vol 2. No 3. 2012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Hemalata S U.Dinesh Acharya Renuka A Priya.R Kamat \" A Secure And High Capacity Image Steganography Technique\" Signal & Image Processing: An International Journal (SIPIJ) Vol. 4 No.1 February 2013  Hemalata S U.Dinesh Acharya Renuka A Priya.R Kamat \" A Secure And High Capacity Image Steganography Technique\" Signal & Image Processing: An International Journal (SIPIJ) Vol. 4 No.1 February 2013","DOI":"10.5121\/sipij.2013.4108"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"G.R. Manjula Ajit Danti \" A Novel Based Least Significant Bit(2-3-3) Image Steganography in Spatial Domain\" Intenational journal of security privacy and Trust Management(IJSPTM) Vol.4 No 1 february 2015  G.R. Manjula Ajit Danti \" A Novel Based Least Significant Bit(2-3-3) Image Steganography in Spatial Domain\" Intenational journal of security privacy and Trust Management(IJSPTM) Vol.4 No 1 february 2015","DOI":"10.5121\/ijsptm.2015.4102"},{"volume-title":"International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST-UMEDIA) 2013 ICAwST.2013","author":"Murakami Kazuki","key":"e_1_3_2_1_8_1"},{"first-page":"27","volume-title":"September - November, 2015","author":"Zope Bhushan","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11833529_82"},{"key":"e_1_3_2_1_11_1","unstructured":"Krenn.R. \"Steganography and Steganalysis\" http:\/\/www.krenn.nl\/univ\/cry\/steg\/article.pdf%20  Krenn.R. \"Steganography and Steganalysis\" http:\/\/www.krenn.nl\/univ\/cry\/steg\/article.pdf%20"},{"key":"e_1_3_2_1_12_1","unstructured":"A Detailed look at Steganographic Techniques and their use in an Open-Systems Environment- Bret Dunbar The information Security reading Room SANS Institute 2002 https:\/\/www.sans.org\/reading-room\/whitepapers\/covert\/detailed-steganographic-techniques-open-systems-environment-677  A Detailed look at Steganographic Techniques and their use in an Open-Systems Environment- Bret Dunbar The information Security reading Room SANS Institute 2002 https:\/\/www.sans.org\/reading-room\/whitepapers\/covert\/detailed-steganographic-techniques-open-systems-environment-677"},{"key":"e_1_3_2_1_13_1","unstructured":"MSE &PSNR http:\/\/in.mathworks.com\/help\/vision\/ref\/psnr.html  MSE &PSNR http:\/\/in.mathworks.com\/help\/vision\/ref\/psnr.html"}],"event":{"name":"ICCDA '17: 2017 International Conference on Compute and Data Analysis","sponsor":["University of Florida University of Florida"],"location":"Lakeland FL USA","acronym":"ICCDA '17"},"container-title":["Proceedings of the International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093241.3093247","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3093241.3093247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:39Z","timestamp":1750217439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093241.3093247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,19]]},"references-count":13,"alternative-id":["10.1145\/3093241.3093247","10.1145\/3093241"],"URL":"https:\/\/doi.org\/10.1145\/3093241.3093247","relation":{},"subject":[],"published":{"date-parts":[[2017,5,19]]},"assertion":[{"value":"2017-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}