{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:35Z","timestamp":1750308575994,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Foundation of China","award":["61503005"],"award-info":[{"award-number":["61503005"]}]},{"name":"Beijing Natural Science Foundation","award":["4162022"],"award-info":[{"award-number":["4162022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,20]]},"DOI":"10.1145\/3175684.3175707","type":"proceedings-article","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T12:47:13Z","timestamp":1523278033000},"page":"149-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A DCT-based Information Hiding Method for Network Authentication"],"prefix":"10.1145","author":[{"given":"Wei","family":"Song","sequence":"first","affiliation":[{"name":"School of Computer Science, North China University of Technology, Beijing, China"}]},{"given":"Shuanghui","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Computer Science, North China University of Technology, Beijing, China"}]},{"given":"Yifei","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Computer Science, North China University of Technology, Beijing, China"}]},{"given":"Chen","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, North China University of Technology, Beijing, China"}]},{"given":"Su","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science, North China University of Technology, Beijing, China"}]},{"given":"Simon","family":"Fong","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Macau, Macau, China"}]}],"member":"320","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Attaby A. A. Ahmed M. F.M. M. and Alsammak A.K. 2017. Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3.Ain Shams Engineering Journal. (Feb. 2017) Attaby A. A. Ahmed M. F.M. M. and Alsammak A.K. 2017. Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3.Ain Shams Engineering Journal. (Feb. 2017)","DOI":"10.1016\/j.asej.2017.02.003"},{"key":"e_1_3_2_1_2_1","volume-title":"2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence) (June 01-06","author":"Ono S.","year":"2008","unstructured":"Ono , S. , Moringe , and K. , Nakayma , S. 2008 . Two-dimensional barcode decoration based on real-coded genetic algorithm . 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence) (June 01-06 , 2008). (Sep. 2008), 1068--1073. Ono, S., Moringe, and K., Nakayma, S. 2008. Two-dimensional barcode decoration based on real-coded genetic algorithm. 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence) (June 01-06, 2008). (Sep. 2008), 1068--1073."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.09.020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Wang R.Z. Lin C.F. and Lin J.C. 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition. 34 (Mar. 2001) 671--683.  Wang R.Z. Lin C.F. and Lin J.C. 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition. 34 (Mar. 2001) 671--683.","DOI":"10.1016\/S0031-3203(00)00015-7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.4.771"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20000341"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.01.019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Chang C.C. Hsiao J.Y. and Chan C.S. 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition. 36 (July. 2003) 1583--1595.  Chang C.C. Hsiao J.Y. and Chan C.S. 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition. 36 (July. 2003) 1583--1595.","DOI":"10.1016\/S0031-3203(02)00289-3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"}],"event":{"name":"BDIOT2017: International Conference on Big Data and Internet of Thing","acronym":"BDIOT2017","location":"London United Kingdom"},"container-title":["Proceedings of the International Conference on Big Data and Internet of Thing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175707","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3175684.3175707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:49Z","timestamp":1750273489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175707"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"references-count":10,"alternative-id":["10.1145\/3175684.3175707","10.1145\/3175684"],"URL":"https:\/\/doi.org\/10.1145\/3175684.3175707","relation":{},"subject":[],"published":{"date-parts":[[2017,12,20]]},"assertion":[{"value":"2017-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}