{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:37:54Z","timestamp":1729661874363,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cidm.2013.6597231","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T12:09:55Z","timestamp":1379592595000},"page":"160-165","source":"Crossref","is-referenced-by-count":1,"title":["Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network"],"prefix":"10.1109","author":[{"given":"El-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.06.006"},{"key":"22","article-title":"UCID-an uncompressed colour image database","author":"schaefer","year":"2004","journal-title":"Proceedings of SPIE Conference on Storage and Retrieval Methods and Applications for Multimedia"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2007.4313232"},{"key":"23","article-title":"Hamming embedding and weak geometric consistency for large scale image search","author":"jegou","year":"2008","journal-title":"Proceedings of the 10th European Conference on Computer Vision ECCV'08"},{"key":"18","first-page":"2808","article-title":"Feature mining and neuro-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images","author":"liu","year":"2007","journal-title":"Proceedings of the Joint International Conference for Artificial Intelligence"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.05.006"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20059022"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2003.10.014"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.01.049"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652894"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.847889"},{"journal-title":"Neural Network Toolbox","year":"2010","author":"demuth","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1117\/1.2802110"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"1","first-page":"11","article-title":"Online social media networking and assessing its security risks","volume":"6","author":"kim","year":"2012","journal-title":"International Journal of Security and its Applications"},{"key":"10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/12.465263","article-title":"Practical steganalysis of digital images-state of the art","volume":"4675","author":"fridrich","year":"2002","journal-title":"Proceedings of SPIE"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"6","first-page":"611","volume":"2006","author":"kumar","year":"2006","journal-title":"Structure and Evolution of Online Social Networks"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"4","first-page":"121","article-title":"Levenbergmarquardt training","volume":"5","author":"yu","year":"2011","journal-title":"Industrial Electronics Handbook 5 - Intelligent Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-88-470-1818-1_13"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","start":{"date-parts":[[2013,4,16]]},"location":"Singapore, Singapore","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588692\/6597208\/06597231.pdf?arnumber=6597231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:11:38Z","timestamp":1498068698000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6597231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cidm.2013.6597231","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}