{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1380861707124184709.json","@type":"Researcher","foaf:Person":[{"foaf:name":[{"@value":"Chang-Tsun Li"}],"foaf:familyName":[{"@value":"Li"}],"foaf:givenName":[{"@value":"Chang-Tsun"}]}],"career":[{"institution":{"notation":[{"@value":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]}}],"product":[{"@id":"https://cir.nii.ac.jp/crid/1360861707124184832","@type":"Article","resourceType":"学術雑誌論文(journal article)","productIdentifier":[{"@type":"DOI","@value":"10.1109/access.2023.3233976"},{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx7/6287639/10005208/10005178.pdf?arnumber=10005178"},{"@type":"DOI","@value":"10.48550/arxiv.2106.06924"}],"notation":[{"@value":"Deep Learning for Predictive Analytics in Reversible Steganography"}],"relation":[{"type":"creator"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/access.2023.3233976_IffTRgd52i12cRqzyXTCROydFGF"},{"@type":"OPENAIRE","@value":"doi_dedup___::dc58ef528eb9c1b8e66a38db1740ddbb_IffTRgd52i12cRqzyXTCROydFGF"}]}