{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:39:12Z","timestamp":1761975552401},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_12","type":"book-chapter","created":{"date-parts":[[2016,10,30]],"date-time":"2016-10-30T23:53:29Z","timestamp":1477871609000},"page":"125-133","source":"Crossref","is-referenced-by-count":16,"title":["Improved Uniform Embedding for Efficient JPEG Steganography"],"prefix":"10.1007","author":[{"given":"Yuanfeng","family":"Pan","sequence":"first","affiliation":[]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Wenkang","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"8","key":"12_CR1","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283\u20131291 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"12_CR2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"12_CR3","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947\u20131962 (2016)","journal-title":"Multimedia Tools Appl."},{"key":"12_CR4","unstructured":"Westfeld, A.: F5 \u2013 a steganographic algorithm. In: Proceedings of the 4th Information Hiding Conference, vol. 2137, pp. 289\u2013302 (2011). http:\/\/wwwrn.inf.tu-dresden.de\/_westfeld\/f5.html"},{"issue":"3","key":"12_CR5","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1007\/978-3-540-74124-4_21","volume-title":"Information Hiding","author":"YH Kim","year":"2007","unstructured":"Kim, Y.H., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314\u2013327. Springer, Heidelberg (2007)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Sachnev, V., Kim, H.J., Zhang, R.: Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 131\u2013140 (2009)","DOI":"10.1145\/1597817.1597841"},{"issue":"5","key":"12_CR8","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814\u2013825 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1\u201313 (2014)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"12","key":"12_CR10","doi-asserted-by":"crossref","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","volume":"10","author":"L Guo","year":"2015","unstructured":"Guo, L., Ni, J., Su, W., Tang, C., Shi, Y.Q.: Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans. Inf. Forensics Secur. 10(12), 2669\u20132680 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815867","volume-title":"Statistical Models: Theory and Practice","author":"DA Freedman","year":"2009","unstructured":"Freedman, D.A.: Statistical Models: Theory and Practice. Cambridge University Press, Cambridge (2009)"},{"key":"12_CR12","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of the 13th International Workshop on Information Hiding, pp. 59\u201370 (2011). http:\/\/www.agents.cz\/boss\/"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, vol. 8303, p. 83030A, February 2012","DOI":"10.1117\/12.907495"},{"issue":"2","key":"12_CR14","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T22:25:06Z","timestamp":1498343106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}