{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:54:42Z","timestamp":1729630482704,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/fskd.2014.6980939","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T16:43:41Z","timestamp":1419957821000},"page":"798-802","source":"Crossref","is-referenced-by-count":1,"title":["Locating steganographic payloads by combining weighed-stego residuals and maximum a posteriori probability cover estimator"],"prefix":"10.1109","author":[{"given":"Tao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaomeng","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232466"},{"key":"2","first-page":"61","article-title":"Attacks on steganographic systems","volume":"1768","author":"westfeld","year":"2000","journal-title":"Third International Workshop on Information Hiding Lecture Notes in Computer Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160855"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1117\/12.805910"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411335"},{"key":"5","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1117\/12.521350","article-title":"On estimation of secret message length in LSB steganography in spatial domain","volume":"5306","author":"fridrich","year":"2004","journal-title":"Proc SPIE Security Steganography Watermarking Multimedia Contents"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(03)00169-5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1117\/12.871635"},{"key":"8","first-page":"1","article-title":"Locating steganographic payload for LSB matching embedding","author":"luo","year":"2011","journal-title":"IEEE International Conference on Multimedia and Expo (ICME)"},{"key":"11","first-page":"5","article-title":"Revisiting weighted stego-image steganalysis","volume":"10","author":"ker","year":"2008","journal-title":"Proc SPIE Security Forensics Steganography and Watermarking of Multimedia Contents X"}],"event":{"name":"2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2014,8,19]]},"location":"Xiamen, China","end":{"date-parts":[[2014,8,21]]}},"container-title":["2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6962871\/6980796\/06980939.pdf?arnumber=6980939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:22:22Z","timestamp":1602674542000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6980939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/fskd.2014.6980939","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}