{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:21:44Z","timestamp":1729664504821,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134415","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Zero Kullback-Liebler Divergence Image Data Hiding"],"prefix":"10.1109","author":[{"family":"Guoqi Luo","sequence":"first","affiliation":[]},{"given":"K. P.","family":"Subbalakshmi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288872"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/11558859_22","article-title":"A general framework for the structural steganalysis of lsb replacement","author":"ker","year":"2005","journal-title":"Proc 7th Information Hiding Workshop"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1419398"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.897266"},{"article-title":"Introduction to Data Compression, sencond edition","year":"2000","author":"sayood","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/10719724_5","article-title":"Attacks on steganographic systems","author":"westfeld","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"ref16","first-page":"21","article-title":"Steganalysis of additive noise modelable information hiding","author":"harmsen","year":"2003","journal-title":"Proc SPIE Electronic Imaging"},{"key":"ref17","first-page":"2297","volume":"88","author":"pincus","year":"1991","journal-title":"Approximate Entropy As A Measure of System Complexity"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1117\/12.767313"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2004.02.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839925"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921684"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530256"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.888005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815951"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863485"},{"key":"ref1","article-title":"A survey of steganographic techniques","author":"cox","year":"2002","journal-title":"Digital Watermarking"},{"journal-title":"Image Steganography and Steganalysis Concepts and Practice","year":"2003","author":"ch","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"journal-title":"LIBSVM A library for support vector machines","year":"2001","author":"chang","key":"ref21"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134415.pdf?arnumber=6134415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T09:31:53Z","timestamp":1497951113000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6134415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6134415","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}