{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:35:58Z","timestamp":1729665358531,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/coginf.2010.5599777","type":"proceedings-article","created":{"date-parts":[[2010,10,12]],"date-time":"2010-10-12T11:44:17Z","timestamp":1286883857000},"page":"925-930","source":"Crossref","is-referenced-by-count":3,"title":["Predicting embedding strength in audio steganography"],"prefix":"10.1109","author":[{"given":"Mengyu","family":"Qiao","sequence":"first","affiliation":[]},{"given":"Andrew H.","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Qingzhong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCBS.2009.119"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178971"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761650"},{"key":"ref13","first-page":"582","article-title":"Spectrum steganalysis of WAV audio streams","author":"liu","year":"2009","journal-title":"Proceedings of the 5th International Conference on Machine Learning and Data Mining"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.001"},{"key":"ref15","first-page":"226","article-title":"Using expanded markov process and joint distribution features for JPEG steganalysis","author":"liu","year":"2009","journal-title":"Proc of International Conference on Agents and Artificial Intelligence"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2008.92"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1117\/12.584426","article-title":"Maximum Likelihood Estimation of Secret Message Length Embedded Using PMK Steganography in Spatial Domain","volume":"5681","author":"fridrich","year":"2005","journal-title":"Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/91.995117"},{"journal-title":"Information Technology - Coding of Moving Pictures and Associated Audio for Digital Storage Media at Up to about 1 5 Mbit\/s Part 3 Audio","year":"1992","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ALPIT.2007.41"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/978-3-540-74124-4_17","article-title":"A Markov process based approach to effective attacking JPEG steganography","volume":"437","author":"shi","year":"2007","journal-title":"Lecture Notes in Computer Sciences"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77370-2_24"},{"key":"ref5","first-page":"1667","article-title":"An algorithm of echo steganalysis based on power cepstrum and pattern classification","author":"zeng","year":"2008","journal-title":"Information Computing and Automation - Proceedings of the International Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631288"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024718"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863485"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631436"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1117\/12.476813","article-title":"Steganalysis of additive noise modelable information hiding","volume":"5020","author":"harmsen","year":"2003","journal-title":"Proc SPIE Security Steganography Watermarking Multimedia Contents"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1022431.1022437"},{"year":"0","key":"ref22"},{"year":"0","key":"ref21"},{"journal-title":"Secure Hash Standard","year":"0","key":"ref24"},{"journal-title":"Information technology - Security techniques - Modes of operation for an n-bit block cipher","year":"0","key":"ref23"},{"journal-title":"Introductory Applied Biostatistics","year":"2005","author":"agostino","key":"ref26"},{"journal-title":"WAVE and AVI Codec Registries - RFC 2361","year":"0","key":"ref25"}],"event":{"name":"2010 9th IEEE International Conference on Cognitive Informatics (ICCI)","start":{"date-parts":[[2010,7,7]]},"location":"Beijing, China","end":{"date-parts":[[2010,7,9]]}},"container-title":["9th IEEE International Conference on Cognitive Informatics (ICCI'10)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5560187\/5599672\/05599777.pdf?arnumber=5599777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T07:59:35Z","timestamp":1559721575000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5599777\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/coginf.2010.5599777","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}