{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:11:41Z","timestamp":1725657101947},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356340","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T23:01:01Z","timestamp":1525993261000},"page":"29-34","source":"Crossref","is-referenced-by-count":2,"title":["LSB-hamming based chaotic steganography (LH-Steg)"],"prefix":"10.23919","author":[{"given":"Marwa","family":"Saidi","sequence":"first","affiliation":[]},{"given":"Houcemeddine","family":"Hermassi","sequence":"additional","affiliation":[]},{"given":"Rhouma","family":"Rhouma","sequence":"additional","affiliation":[]},{"given":"Safya","family":"Belghith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/12.696774"},{"key":"ref12","first-page":"340","article-title":"Detecting hidden messages using higherorder statistics and support vector machines","author":"lyu","year":"2002","journal-title":"Information Hiding"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1117\/12.643254"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873595"},{"key":"ref15","first-page":"249","article-title":"A Markov process based approach to effective attacking JPEG steganography","author":"shi","year":"2006","journal-title":"International Workshop on Information Hiding"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2008.03.016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482965"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.01.050"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.807363"},{"key":"ref2","first-page":"94090h","article-title":"Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model","author":"sedighi","year":"2015","journal-title":"Media Watermarking Security and Forensics"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0313-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356340.pdf?arnumber=8356340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:24:15Z","timestamp":1527553455000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356340\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356340","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}