{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:22Z","timestamp":1750221262237,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T00:00:00Z","timestamp":1539043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,9]]},"DOI":"10.1145\/3264746.3264752","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T13:19:23Z","timestamp":1539263963000},"page":"136-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Data hiding using compressed archives"],"prefix":"10.1145","author":[{"given":"Bruno","family":"Carpentieri","sequence":"first","affiliation":[{"name":"University of Salerno, Fisciano (SA), Italy"}]},{"given":"Arcangelo","family":"Castiglione","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano (SA), Italy"}]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano (SA), Italy"}]},{"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano (SA), Italy"}]},{"given":"Raffaele","family":"Pizzolante","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano (SA), Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2010.14"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-013-0181-z"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32498-7_30"},{"key":"e_1_3_2_1_4_1","volume-title":"Decrypted secrets - methods and maxims of cryptology (4. ed.)","author":"Bauer F.L.","year":"2007","unstructured":"F.L. Bauer . Decrypted secrets - methods and maxims of cryptology (4. ed.) . Springer , 2007 . F.L.Bauer. Decrypted secrets - methods and maxims of cryptology (4. ed.). Springer, 2007."},{"key":"e_1_3_2_1_5_1","first-page":"476","volume-title":"29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015","author":"Castiglione A.","year":"2015","unstructured":"A. Castiglione , Alfredo De Santis , R. Pizzolante , A. Castiglione , V. Loia , and F. Palmieri . On the protection of fmri images in multi-domain environments. In L. Barolli, M. Takizawa, F. Xhafa, T. Enokido, and J. H. Park, editors , 29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015 , Gwangju, South Korea, March 24--27 , 2015 , pages 476 -- 481 . IEEE Computer Society, 2015. A. Castiglione, Alfredo De Santis, R. Pizzolante, A. Castiglione, V. Loia, and F. Palmieri. On the protection of fmri images in multi-domain environments. In L. Barolli, M. Takizawa, F. Xhafa, T. Enokido, and J. H. Park, editors, 29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangju, South Korea, March 24--27, 2015, pages 476--481. IEEE Computer Society, 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2011.133"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.07.068"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893474"},{"key":"e_1_3_2_1_9_1","volume-title":"Information hiding techniques for steganography and digital watermarking. Computing","author":"Katzenbeisser S.","year":"2000","unstructured":"S. Katzenbeisser and F. Petitcolas . Information hiding techniques for steganography and digital watermarking. Computing . Artech House , Norwood , 2000 . S. Katzenbeisser and F. Petitcolas. Information hiding techniques for steganography and digital watermarking. Computing. Artech House, Norwood, 2000."},{"key":"e_1_3_2_1_10_1","series-title":"SPIE Proceedings","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1117\/12.465313","volume-title":"Security and Watermarking of Multimedia Contents IV","author":"Katzenbeisser S.","year":"2002","unstructured":"S. Katzenbeisser and F. A. P. Petitcolas . Defining security in steganographic systems . In E. J. D. III and P. W. Wong, editors, Security and Watermarking of Multimedia Contents IV , San Jose, CA, USA , January 19, 2002 , volume 4675 of SPIE Proceedings , pages 50 -- 56 . SPIE , 2002. S. Katzenbeisser and F. A. P. Petitcolas. Defining security in steganographic systems. In E. J. D. III and P. W. Wong, editors, Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, January 19, 2002, volume 4675 of SPIE Proceedings, pages 50--56. SPIE, 2002."},{"key":"e_1_3_2_1_11_1","volume-title":"Information Hiding","author":"Katzenbeisser S.","year":"2015","unstructured":"S. Katzenbeisser and F. A. P. Petitcolas . Information Hiding . Artech House information security and privacy series. Artech House , 2015 . S. Katzenbeisser and F. A. P. Petitcolas. Information Hiding. Artech House information security and privacy series. Artech House, 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.73"},{"issue":"5","key":"e_1_3_2_1_14_1","first-page":"1189","article-title":"Copyright protection for digital images on portable devices","volume":"35","author":"Pizzolante R.","year":"2016","unstructured":"R. Pizzolante and B. Carpentieri . Copyright protection for digital images on portable devices . Computing and Informatics , 35 ( 5 ): 1189 -- 1209 , 2016 . R. Pizzolante and B. Carpentieri. Copyright protection for digital images on portable devices. Computing and Informatics, 35(5): 1189--1209, 2016.","journal-title":"Computing and Informatics"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2013.68"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2011.153"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2014.116"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.139"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.138"}],"event":{"name":"RACS '18: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","KISM Korean Institute of Smart Media"],"location":"Honolulu Hawaii","acronym":"RACS '18"},"container-title":["Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264746.3264752","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264746.3264752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:54Z","timestamp":1750212654000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264746.3264752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,9]]},"references-count":19,"alternative-id":["10.1145\/3264746.3264752","10.1145\/3264746"],"URL":"https:\/\/doi.org\/10.1145\/3264746.3264752","relation":{},"subject":[],"published":{"date-parts":[[2018,10,9]]},"assertion":[{"value":"2018-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}