{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:02:41Z","timestamp":1754107361412,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,25]],"date-time":"2018-02-25T00:00:00Z","timestamp":1519516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,25]]},"DOI":"10.1145\/3193025.3193045","type":"proceedings-article","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T17:51:36Z","timestamp":1526579496000},"page":"142-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Video Steganography Using Karhunen-Lo\u00e8ve Transform"],"prefix":"10.1145","author":[{"given":"Subhajit","family":"Roy","sequence":"first","affiliation":[{"name":"Computer Science &amp; Engineering Department, National Institute of Technology, Durgapur, India"}]},{"given":"Srilekha","family":"Mukherjee","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering Department, National Institute of Technology, Durgapur, India"}]},{"given":"Goutam","family":"Sanyal","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering Department, National Institute of Technology, Durgapur, India"}]}],"member":"320","published-online":{"date-parts":[[2018,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"31","volume-title":"Vol-79","author":"Ankit N","year":"2013","unstructured":"C Ankit , Satam N , Sood R , Bade D , \" Image Steganography using Karhunen --Loeve transform and least bit Substitution\", International journal of computer applications , Vol-79 , Oct 2013 , pp. 31 -- 37 C Ankit, Satam N, Sood R, Bade D, \"Image Steganography using Karhunen --Loeve transform and least bit Substitution\", International journal of computer applications, Vol-79, Oct 2013, pp. 31--37"},{"key":"e_1_3_2_1_2_1","first-page":"660","volume-title":"IEEE Second Int Conf","author":"Moon SK","year":"2013","unstructured":"Moon SK , Raut RD , \" Analysis of secured video steganography using computer forensics technique for enhance data security\", Image Information Processing (ICIIP) . IEEE Second Int Conf , 2013 , pp. 660 -- 665 . Moon SK, Raut RD, \"Analysis of secured video steganography using computer forensics technique for enhance data security\", Image Information Processing (ICIIP). IEEE Second Int Conf, 2013, pp. 660--665."},{"volume-title":"Applications and Technology Conference (LISAT),2015","author":"Mstafa KM","key":"e_1_3_2_1_3_1","unstructured":"RJ Mstafa , KM Elleithy , \" A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes\". Systems , Applications and Technology Conference (LISAT),2015 . RJ Mstafa, KM Elleithy, \"A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes\". Systems, Applications and Technology Conference (LISAT),2015."},{"key":"e_1_3_2_1_4_1","first-page":"90","volume-title":"Inform Sci","author":"Qazanfari R","unstructured":"K Qazanfari , R Safabakhsh , \" A new steganography method which preserves histogram: Generalization of LSB++ \". Inform Sci , pp. 90 -- 101 . K Qazanfari, R Safabakhsh, \"A new steganography method which preserves histogram: Generalization of LSB++\". Inform Sci, pp. 90--101."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1952-z"},{"key":"e_1_3_2_1_6_1","first-page":"1525","article-title":"A novel chaotic approach for information hiding in image","volume":"2012","author":"Farschi M","unstructured":"S Farschi , M Farschi , \" A novel chaotic approach for information hiding in image .\" Nonlinear Dyn69(4) , 2012 pp. 1525 -- 1539 . S Farschi, M Farschi, \"A novel chaotic approach for information hiding in image.\" Nonlinear Dyn69(4), 2012 pp. 1525--1539.","journal-title":"Nonlinear Dyn69(4)"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2013.07.007"},{"key":"e_1_3_2_1_8_1","first-page":"229","volume-title":"IEEE 2nd International Conference on contemporary computing and informatics-2016","author":"Roy Subhajit G","unstructured":"Roy Subhajit , Sanyal G , \"an approach to selective encryption on compressed image \", IEEE 2nd International Conference on contemporary computing and informatics-2016 , pp. 229 -- 234 Roy Subhajit, Sanyal G, \"an approach to selective encryption on compressed image\", IEEE 2nd International Conference on contemporary computing and informatics-2016, pp. 229--234"},{"key":"e_1_3_2_1_9_1","first-page":"2","article-title":"Steganography using Karhunen loeve transform and optimum pixel adjustment","volume":"4","author":"Alvi R S","year":"2014","unstructured":"Alvi R S , Bhosale S , \" Steganography using Karhunen loeve transform and optimum pixel adjustment \", Internatonal Journal of electrical and electronics engineering research , vol 4 , Issue- 2 , Apr 2014 , pp. 125--30. Alvi R S, Bhosale S, \"Steganography using Karhunen loeve transform and optimum pixel adjustment\", Internatonal Journal of electrical and electronics engineering research, vol 4, Issue-2, Apr 2014, pp. 125--30.","journal-title":"Internatonal Journal of electrical and electronics engineering research"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3060-0"},{"key":"e_1_3_2_1_11_1","first-page":"337","volume-title":"Confluence 2013: The Next Generation Information Technology Summit (4th International Conference)","author":"Paul R","unstructured":"Paul R , Acharya AK , Yadav VK , Batham S , \" Hiding large amount of data using a new approach of video steganography\". Confluence 2013: The Next Generation Information Technology Summit (4th International Conference) , pp. 337 -- 343 . Paul R, Acharya AK, Yadav VK, Batham S, \"Hiding large amount of data using a new approach of video steganography\". Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp. 337--343."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2012.6395377"}],"event":{"name":"ICDSP 2018: 2018 2nd International Conference on Digital Signal Processing","acronym":"ICDSP 2018","location":"Tokyo Japan"},"container-title":["Proceedings of the 2nd International Conference on Digital Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193025.3193045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3193025.3193045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:09Z","timestamp":1750213569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193025.3193045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,25]]},"references-count":12,"alternative-id":["10.1145\/3193025.3193045","10.1145\/3193025"],"URL":"https:\/\/doi.org\/10.1145\/3193025.3193045","relation":{},"subject":[],"published":{"date-parts":[[2018,2,25]]},"assertion":[{"value":"2018-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}