{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:39Z","timestamp":1750309599631,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T00:00:00Z","timestamp":1732233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,22]]},"DOI":"10.1145\/3722237.3722310","type":"proceedings-article","created":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T06:54:35Z","timestamp":1745996075000},"page":"422-425","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Steganography Course with Large Language Model ChatGPT Assisted Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5502-8033","authenticated-orcid":false,"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[{"name":"Dept. of C.S. and Info. Eng., Asia University, Taichung, Taiwan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8738-6458","authenticated-orcid":false,"given":"Kanza","family":"Fatima","sequence":"additional","affiliation":[{"name":"Dept. of C.S. and Info. Eng., Asia University, Taichung, Taiwan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7324-8320","authenticated-orcid":false,"given":"Chi-Shiang","family":"Chan","sequence":"additional","affiliation":[{"name":"Department of M-Commerce and Multimedia Applications, Asia University, Taichung, Taiwan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9576-561X","authenticated-orcid":false,"given":"Chia-Chun","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Quemoy University, Kinmen, Taiwan, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"issue":"1","key":"e_1_3_3_1_1_2","first-page":"25","article-title":"Research on Education Information Security Sharing Based on Blockchain and Bayesian Network","volume":"26","author":"Feng D.","year":"2024","unstructured":"Feng, D., Li, H. (2024). Research on Education Information Security Sharing Based on Blockchain and Bayesian Network. International Journal of Network Security, 26(1), 25-32.","journal-title":"International Journal of Network Security"},{"issue":"4","key":"e_1_3_3_1_2_2","first-page":"801","article-title":"A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching","volume":"20","author":"Wang Y. L.","year":"2018","unstructured":"Wang, Y. L., Shen, J. J., Hwang, M. S. (2018). A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching. International Journal of Network Security, 20(4), 801-804.","journal-title":"International Journal of Network Security"},{"issue":"2","key":"e_1_3_3_1_3_2","first-page":"201","article-title":"Overlapping Difference Expansion Reversible Data Hiding","volume":"25","author":"Lee C. F.","year":"2023","unstructured":"Lee, C. F., Shen, J. J., Wu, C. Y. (2023). Overlapping Difference Expansion Reversible Data Hiding. International Journal of Network Security, 25(2), 201-211.","journal-title":"International Journal of Network Security"},{"issue":"6","key":"e_1_3_3_1_4_2","first-page":"1114","article-title":"Research on Data Hiding Schemes for AMBTC Compressed Images","volume":"24","author":"Anggriani K.","year":"2022","unstructured":"Anggriani, K., Wu, N. I., Hwang, M. S. (2022). Research on Data Hiding Schemes for AMBTC Compressed Images. International Journal of Network Security, 24(6), 1114-1123.","journal-title":"International Journal of Network Security"},{"issue":"2","key":"e_1_3_3_1_5_2","first-page":"221","article-title":"High Embedding Capacity Data Hiding Technique Based on Hybrid AMBTC and LSB Substitutions","volume":"25","author":"Lai P. C.","year":"2023","unstructured":"Lai, P. C., Shen, J. J., Chou Y. C. (2023). High Embedding Capacity Data Hiding Technique Based on Hybrid AMBTC and LSB Substitutions. International Journal of Network Security, 25(2), 221-234.","journal-title":"International Journal of Network Security"},{"issue":"4","key":"e_1_3_3_1_6_2","first-page":"703","article-title":"Image Enhancement and Cloud Secure Transmission Based on Reversible Image Information Hiding Technology","volume":"26","author":"Li Z.","year":"2024","unstructured":"Li, Z. (2024). Image Enhancement and Cloud Secure Transmission Based on Reversible Image Information Hiding Technology. International Journal of Network Security, 26(4), 703-712.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.hpe.2016.01.004"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2023.102274"},{"key":"e_1_3_3_1_9_2","volume-title":"ChatGPT for higher education and professional guide to conversational AI.","author":"Atlas S.","year":"2023","unstructured":"Atlas, S. (2023). ChatGPT for higher education and professional guide to conversational AI. Retrieved from https: \/\/digitalcommons.uri.edu\/cba_facpubs\/548"},{"issue":"4","key":"e_1_3_3_1_10_2","first-page":"16100","article-title":"Can ChatGPT replace the role of the teacher in the classroom: A fundamental analysis","volume":"5","author":"Ausat A. M. A.","year":"2023","unstructured":"Ausat, A. M. A., Massang, B., Efendi, M., Nofirman, N., & Riady, Y. (2023). Can ChatGPT replace the role of the teacher in the classroom: A fundamental analysis. Journal on Education, 5(4), 16100-16106.","journal-title":"Journal on Education"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12195-022-00754-8"},{"key":"e_1_3_3_1_12_2","first-page":"17","volume-title":"Proceedings of the IJCNLP 2017","author":"Wang J. Y.","year":"2017","unstructured":"Wang, J. Y., Kuo, M. F., Han, J. C., Shih, C. C., Chen, C. H., Lee, P. C., Tsai, T. H. (2017). A Telecom-Domain Online Customer Service Assistant Based on Question Answering with Word Embedding and Intent Classification. Proceedings of the IJCNLP 2017, System Demonstrations, 2017: 17-20."}],"event":{"name":"ICAIE 2024: 2024 3rd International Conference on Artificial Intelligence and Education","acronym":"ICAIE 2024","location":"Xiamen China"},"container-title":["Proceedings of the 2024 3rd International Conference on Artificial Intelligence and Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722237.3722310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3722237.3722310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:05Z","timestamp":1750298225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722237.3722310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,22]]},"references-count":12,"alternative-id":["10.1145\/3722237.3722310","10.1145\/3722237"],"URL":"https:\/\/doi.org\/10.1145\/3722237.3722310","relation":{},"subject":[],"published":{"date-parts":[[2024,11,22]]},"assertion":[{"value":"2025-04-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}