{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:17:32Z","timestamp":1729646252666,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icassp.2004.1326485","type":"proceedings-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T13:50:22Z","timestamp":1096379422000},"page":"iii-77-80","source":"Crossref","is-referenced-by-count":1,"title":["An analysis of quantization based embedding-detection techniques"],"prefix":"10.1109","volume":"3","author":[{"given":"H.T.","family":"Sencar","sequence":"first","affiliation":[]},{"given":"M.","family":"Ramkumar","sequence":"additional","affiliation":[]},{"given":"A.N.","family":"Akansu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056659"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246728"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809366"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2005.07.018"},{"key":"7","first-page":"4\/1","article-title":"a blind watermarking scheme based on structured codebooks","author":"eggers","year":"2000","journal-title":"IEE Seminar on Secure Images and Image Authentication"},{"key":"6","article-title":"Self-noise suppression schemes for blind image steganography","volume":"3845","author":"ramkumar","year":"1999","journal-title":"Proc SPIE International Workshop on Voice Video and Data Communication Multimedia Applications"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"4","first-page":"19","article-title":"Coding for channel with random parameters","volume":"9","author":"gelfand","year":"1980","journal-title":"Problems of Control and Information Theory"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.1999.832000"},{"key":"8","article-title":"A robust optimization solution to the data hiding problem using distributed source coding principles","volume":"3974","author":"chou","year":"2000","journal-title":"Proc SPIE Image and Video Communications and Processing"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809368"},{"key":"12","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1117\/12.384995","article-title":"Preprocessed and postprocessed quantization index modulation methods for digital watermarking","volume":"3971","author":"chen","year":"2000","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents II"}],"event":{"name":"2004 IEEE International Conference on Acoustics, Speech, and Signal Processing","acronym":"ICASSP-04","location":"Montreal, Que., Canada"},"container-title":["2004 IEEE International Conference on Acoustics, Speech, and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9248\/29345\/01326485.pdf?arnumber=1326485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T10:26:04Z","timestamp":1497608764000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1326485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icassp.2004.1326485","relation":{},"subject":[]}}