{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:52:25Z","timestamp":1729651945900,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cit.2004.1357167","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T04:34:02Z","timestamp":1103776442000},"page":"12-17","source":"Crossref","is-referenced-by-count":7,"title":["Steganography using JPEG-compressed images"],"prefix":"10.1109","author":[{"family":"Hsien-Wen Tseng","sequence":"first","affiliation":[]},{"family":"Chin-Chen Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/3-540-49380-8_19","article-title":"Steganalysis of images created using current steganography software","author":"johnson","year":"1998","journal-title":"Proceedings of Information Hiding Workshop"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1117\/12.384978"},{"key":"12","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1117\/12.435412","article-title":"A data hiding technique in JPEG compressed domain","volume":"4314","author":"wong","year":"2001","journal-title":"Proc SPIE Security Watermarking Multimedia Contents II"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(00)00015-7"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/4233.992161"},{"journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","author":"katzenbeisser","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00194-3"},{"journal-title":"JPEG Still Image Data Compression Standard","year":"1993","author":"pennebaker","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/ICIP.1997.647971","article-title":"A multiresolution watermark for digital images","volume":"3","author":"xia","year":"1997","journal-title":"Proceedings of IEEE International Conference on Image Processing"},{"key":"5","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1109\/5.771067","article-title":"Perceptual watermarks for digital images and video","volume":"87","author":"wolfgang","year":"1999","journal-title":"Proceeding of the IEEE"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.901024"},{"key":"8","first-page":"1469","article-title":"A method of embedding binary data into JPEG bitstreams","volume":"j83 d","author":"kobayashi","year":"1999","journal-title":"IEICE Trans Information and Systems"}],"event":{"name":"The Fourth International Conference onComputer and Information Technology, 2004. CIT '04.","location":"Wuhan, China"},"container-title":["The Fourth International Conference onComputer and Information Technology, 2004. CIT '04."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9381\/29791\/01357167.pdf?arnumber=1357167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T21:53:07Z","timestamp":1682891587000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1357167\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cit.2004.1357167","relation":{},"subject":[]}}