{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:55:47Z","timestamp":1725573347431},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540228431"},{"type":"electronic","value":"9783540286486"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28648-6_109","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T19:38:54Z","timestamp":1292873934000},"page":"681-687","source":"Crossref","is-referenced-by-count":2,"title":["The Algorithm for Detecting Hiding Information Based on SVM"],"prefix":"10.1007","author":[{"given":"JiFeng","family":"Huang","sequence":"first","affiliation":[]},{"given":"JiaJun","family":"Lin","sequence":"additional","affiliation":[]},{"given":"XiaoFu","family":"He","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"109_CR1","doi-asserted-by":"crossref","unstructured":"Farid, H.: Detecting Hidden Messages Using Higher-Order Statistical Models. In: International Conference on Image Processing, Rochester, New York (2002)","DOI":"10.1109\/ICIP.2002.1040098"},{"key":"109_CR2","unstructured":"Jeremiah, J.H., William, A.P.: Kernel Fisher Discriminant for Steganalysis of JPEG Hiding Methods, Available: \n                    \n                      http:\/\/www.cipr.rpi.edu\/harmsj\/pubs"},{"issue":"4","key":"109_CR3","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal on Selected Areas in Communications\u00a016(4), 474\u2013481 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"109_CR4","unstructured":"Provos, N.: Defending Against Statistical Steganalysis. In: Proc.10th USENIX Security Symposium, Washington, DC, pp. 323\u2013335 (2001)"},{"issue":"10","key":"109_CR5","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1109\/83.869177","volume":"9","author":"E.J. Lam","year":"2000","unstructured":"Lam, E.J., Goodman, J.W.: A Mathematical Analysis of the DCT Coefficient Distributions for Images. IEEE Transactions on Image Processing\u00a09(10), 1661\u20131666 (2000), \n                    \n                      http:\/\/www.photo.net\/philg\/digiphotos","journal-title":"IEEE Transactions on Image Processing"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28648-6_109.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:31:51Z","timestamp":1620012711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28648-6_109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540228431","9783540286486"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28648-6_109","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}