iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/CIS.2011.136
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:09:19Z","timestamp":1730207359255,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/cis.2011.136","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T11:36:29Z","timestamp":1330601789000},"page":"593-597","source":"Crossref","is-referenced-by-count":0,"title":["Researches and Simulations of Information Hiding in Alamouti Transmission System"],"prefix":"10.1109","author":[{"given":"Liquan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Miao","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jingbo","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057683"},{"key":"2","first-page":"321","article-title":"Overview of information hiding technology","volume":"3","author":"chang","year":"2010","journal-title":"CHINA SCIENCE AND TECHNOLOGY INFORMATION"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/5.705532"},{"key":"1","first-page":"208212","article-title":"The application research of information hiding technology in network security","author":"jing","year":"2009","journal-title":"Second International Symposium on Information Science and Engineering"},{"key":"7","first-page":"3236","article-title":"The information hiding capacity model based on error correction code","volume":"36","author":"yan","year":"2010","journal-title":"Eng Comput"},{"key":"6","first-page":"561","article-title":"The research of space-time block code for improving system capacity","volume":"10","author":"liu","year":"2005","journal-title":"Journal of Electronic and Information"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/49.730453"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1049\/el:19961141"},{"journal-title":"Digital Communication (Fourth Version)","year":"2003","author":"prokis","key":"9"},{"key":"8","first-page":"167","article-title":"The performance research of alamouti space-time coding scheme","volume":"2","author":"gong","year":"2008","journal-title":"JOURNAL OF CHONGQING UNIVERSITY OF POST AND TELECOMMUNICATIONS (NATURAL SCIENCE EDITION)"}],"event":{"name":"2011 Seventh International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2011,12,3]]},"location":"Sanya, Hainan, China","end":{"date-parts":[[2011,12,4]]}},"container-title":["2011 Seventh International Conference on Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6126162\/6128049\/06128192.pdf?arnumber=6128192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T12:32:52Z","timestamp":1490099572000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6128192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":10,"URL":"http:\/\/dx.doi.org\/10.1109\/cis.2011.136","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}