{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:55Z","timestamp":1750220275018,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3544109.3544397","type":"proceedings-article","created":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T21:49:24Z","timestamp":1658180964000},"page":"999-1003","source":"Crossref","is-referenced-by-count":0,"title":["Image steganography algorithm for blind detection based on optimal wavelet packet decomposition"],"prefix":"10.1145","author":[{"given":"Fen","family":"Li","sequence":"first","affiliation":[{"name":"Wuhan Qingchuan University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2015.09.016"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7459621"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05825-y"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2021-0044"},{"volume-title":"Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve. The imaging science journal","author":"Yadav G S","key":"e_1_3_2_1_6_1","unstructured":"Yadav G S , Ojha A . Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve. The imaging science journal , vol. 67 , no. 3-4, pp. 148-158, 2019. Yadav G S , Ojha A . Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve. The imaging science journal, vol. 67, no. 3-4, pp. 148-158, 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20113108"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.OE.55.1.013103"},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"217","volume":"21","author":"Reshma V K","year":"2020","unstructured":"Reshma V K , Vinod K , Shahi D , Chicken-Moth Search Optimization-based Deep Convolutional Neural Network for Image Steganography . Scalable Computing ,vol. 21 , no. 2 , pp. 217 - 232 , 2020 . Reshma V K , Vinod K , Shahi D , Chicken-Moth Search Optimization-based Deep Convolutional Neural Network for Image Steganography. Scalable Computing,vol. 21, no. 2, pp. 217-232, 2020.","journal-title":"Scalable Computing"},{"volume-title":"Infrared Image Segmentation Algorithm for Defect Detection Based on FODPSO. Infrared Physics & Technology","author":"Tang Q","key":"e_1_3_2_1_10_1","unstructured":"Tang Q , Gao S , Liu Y , Infrared Image Segmentation Algorithm for Defect Detection Based on FODPSO. Infrared Physics & Technology , vol. 102 , no. 2, pp. 103051, 2019. Tang Q, Gao S, Liu Y, Infrared Image Segmentation Algorithm for Defect Detection Based on FODPSO. Infrared Physics & Technology, vol. 102, no. 2, pp. 103051, 2019."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1088\/0967-3334\/37\/3\/442"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01431161.2016.1246772"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2595563"}],"event":{"name":"IPEC2022: 2022 3rd Asia-Pacific Conference on Image Processing, Electronics and Computers","acronym":"IPEC2022","location":"Dalian China"},"container-title":["2022 3rd Asia-Pacific Conference on Image Processing, Electronics and Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544109.3544397","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544109.3544397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:10Z","timestamp":1750188670000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544109.3544397"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":13,"alternative-id":["10.1145\/3544109.3544397","10.1145\/3544109"],"URL":"https:\/\/doi.org\/10.1145\/3544109.3544397","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]}}}