{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:35:39Z","timestamp":1730198139527,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/apsipa.2015.7415374","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T15:11:46Z","timestamp":1459177906000},"page":"757-760","source":"Crossref","is-referenced-by-count":2,"title":["A new detector of LSB matching steganography based on likelihood ratio test for multivariate Gaussian covers"],"prefix":"10.1109","author":[{"given":"Guangyuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zongming","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2238232"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.09.012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1117\/12.766820"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2007.4412897"},{"key":"ref16","first-page":"59","article-title":"Break our steganographic system - the ins and outs of organizing BOSS","volume":"6985","author":"bas","year":"2011","journal-title":"Proc IH"},{"key":"ref4","first-page":"791","article-title":"A comparative study of &#x00B1;1 steganalyzers","author":"cancelli","year":"2008","journal-title":"Multimedia Signal Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411353"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5651567"},{"key":"ref5","first-page":"1505","article-title":"t'Detecting LSB matching by characterizing the amplitude of histogram","author":"gao","year":"2009","journal-title":"Proc IEEE ICA SSP"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/12.643254"},{"key":"ref7","first-page":"44","article-title":"Calibration Based Reliable Detector for Detecting LSB Matching Steganography","author":"peng","year":"2012","journal-title":"Proc IWDW"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.847889"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1117\/12.476813"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.01.014"}],"event":{"name":"2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)","start":{"date-parts":[[2015,12,16]]},"location":"Hong Kong","end":{"date-parts":[[2015,12,19]]}},"container-title":["2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7406495\/7415286\/07415374.pdf?arnumber=7415374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:34:11Z","timestamp":1490096051000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7415374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/apsipa.2015.7415374","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}