{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:17:57Z","timestamp":1730200677362,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/bigmm.2018.8499451","type":"proceedings-article","created":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T00:35:25Z","timestamp":1540254925000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["A New Data Embedding Method with a New Data Embedding Domain for JPEG Images"],"prefix":"10.1109","author":[{"given":"Yuanfang","family":"Guo","sequence":"first","affiliation":[]},{"given":"Xiaochun","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738935"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6116241"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2021313"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2359368"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/30.125072"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.12.002"},{"key":"ref16","first-page":"59","article-title":"Break our steganographic system: The ins and outs of organizing boss","author":"filler","year":"2011","journal-title":"Proc 6th Int Workshop Inf Hiding"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.1014990"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705625"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2718480"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163627"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2815181"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2009.20"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics and Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2181342"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2013.6694331"}],"event":{"name":"2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)","start":{"date-parts":[[2018,9,13]]},"location":"Xi'an","end":{"date-parts":[[2018,9,16]]}},"container-title":["2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8482104\/8499056\/08499451.pdf?arnumber=8499451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T16:39:43Z","timestamp":1643215183000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8499451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/bigmm.2018.8499451","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}