{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:14Z","timestamp":1750219814947,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3603938","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"900-905","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A robust video steganography algorithm for H.264\/AVC based on secret sharing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7437-975X","authenticated-orcid":false,"given":"Xuanlei","family":"Liu","sequence":"first","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6476-8201","authenticated-orcid":false,"given":"Bing","family":"Zhao","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0135-0397","authenticated-orcid":false,"given":"Wenjia","family":"Wang","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04010-6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08025-x"},{"key":"e_1_3_2_1_3_1","volume-title":"Linguistic steganalysis using the features derived from synonym frequency. Multimedia tools and applications, 71:1893\u20131911","author":"Xiang Lingyun","year":"2014","unstructured":"Lingyun Xiang , Xingming Sun , Gang Luo , and Bin Xia . Linguistic steganalysis using the features derived from synonym frequency. Multimedia tools and applications, 71:1893\u20131911 , 2014 . Lingyun Xiang, Xingming Sun, Gang Luo, and Bin Xia. Linguistic steganalysis using the features derived from synonym frequency. Multimedia tools and applications, 71:1893\u20131911, 2014."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.3032875"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3449-4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3301-x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09720-w"},{"key":"e_1_3_2_1_8_1","volume-title":"Prediction mode modulated data-hiding algorithm for h. 264\/avc. Journal of real-time image processing, 7:205\u2013214","author":"Xu Dawen","year":"2012","unstructured":"Dawen Xu , Rangding Wang , and Jicheng Wang . Prediction mode modulated data-hiding algorithm for h. 264\/avc. Journal of real-time image processing, 7:205\u2013214 , 2012 . Dawen Xu, Rangding Wang, and Jicheng Wang. Prediction mode modulated data-hiding algorithm for h. 264\/avc. Journal of real-time image processing, 7:205\u2013214, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20185242"},{"key":"e_1_3_2_1_10_1","first-page":"176","volume-title":"Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings 16","author":"Wang Yu","unstructured":"Yu Wang , Yun Cao , Xianfeng Zhao , and Linna Zhou . A prediction mode-based information hiding approach for h. 264\/avc videos minimizing the impacts on rate-distortion optimization . In Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings 16 , pages 163\u2013 176 . Springer, 2017. Yu Wang, Yun Cao, Xianfeng Zhao, and Linna Zhou. A prediction mode-based information hiding approach for h. 264\/avc videos minimizing the impacts on rate-distortion optimization. In Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings 16, pages 163\u2013176. Springer, 2017."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4698-6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08528-7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6976-3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08525-w"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.010075"},{"key":"e_1_3_2_1_16_1","volume-title":"A robust without intra-frame distortion drift data hiding algorithm based on h. 264\/avc. Multimedia tools and applications, 72:613\u2013636","author":"Liu Yunxia","year":"2014","unstructured":"Yunxia Liu , Zhitang Li , Xiaojing Ma , and Jian Liu . A robust without intra-frame distortion drift data hiding algorithm based on h. 264\/avc. Multimedia tools and applications, 72:613\u2013636 , 2014 . Yunxia Liu, Zhitang Li, Xiaojing Ma, and Jian Liu. A robust without intra-frame distortion drift data hiding algorithm based on h. 264\/avc. Multimedia tools and applications, 72:613\u2013636, 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.03.088"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.10.109"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2869148"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2019.09.008"}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603938","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3603938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:06Z","timestamp":1750178766000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":20,"alternative-id":["10.1145\/3603781.3603938","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3603938","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}