{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:43:50Z","timestamp":1729608230731,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/icassp.2010.5495434","type":"proceedings-article","created":{"date-parts":[[2010,7,6]],"date-time":"2010-07-06T14:17:18Z","timestamp":1278425838000},"page":"1770-1773","source":"Crossref","is-referenced-by-count":1,"title":["Towards objectifying information hiding"],"prefix":"10.1109","author":[{"given":"Abbas","family":"Cheddad","sequence":"first","affiliation":[]},{"given":"Joan","family":"Condell","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Curran","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Mc Kevitt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"61","article-title":"Attacks on steganographic systems breaking the steganography utilities EzStego, Jsteg, Steganos and S-Tools and some lessons learned","author":"westfield","year":"1999","journal-title":"Proc 3rd International Workshop on Information Hiding Dresden Germany LNCS 1768"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2000.889233"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NRSC.2008.4542319"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.4655281"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467805001719"},{"key":"ref16","first-page":"30","article-title":"A data embedding method using BPCS principle with new complexity measures","author":"hioki","year":"2002","journal-title":"Proc Pacific Rim Workshop on Digital Steganography"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.477301"},{"key":"ref18","first-page":"278","article-title":"Steganography preserving statistical properties","volume":"2578 2003","author":"franz","year":"2003","journal-title":"Proc of the 5th International Workshop on Information Hiding Noordwijkerhout The Netherlands LNCS"},{"key":"ref19","first-page":"61","article-title":"Attacks on steganographic systems","author":"westfeld","year":"2000","journal-title":"Proc 3rd International Workshop on Information Hiding Dresden Germany LNCS 1768"},{"key":"ref4","article-title":"Principles of steganography","author":"katzenbeisser","year":"2000","journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1117\/12.759147"},{"key":"ref3","article-title":"Information hiding, watermarking and steganography","author":"cox","year":"2009","journal-title":"Public Seminar Intelligent Systems Research Centre University of Ulster Northern Ireland"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCON.2002.1215952"},{"key":"ref5","first-page":"1","article-title":"The effect of linearization of range in skin detection","author":"corey","year":"2007","journal-title":"in Proc IEEE 6th International Conference on Information Communications & Signal Processing"},{"article-title":"Disappearing Cryptography","year":"2002","author":"wayner","key":"ref8"},{"key":"ref7","article-title":"Using extended file information (EXIF) file headers in digital evidence analysis","volume":"2","author":"alvarez","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref2","first-page":"67","author":"siwei","year":"2005","journal-title":"Natural Image Statistics for Digital Image Forensics"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","article-title":"The prisoners&#x2019; problem and the subliminal channel","author":"simmons","year":"1984","journal-title":"Proc Adv Cryptology?Crypto"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4375-6","author":"johnson","year":"2001","journal-title":"Information Hiding Steganography and Watermarking - Attacks and Countermeasures"},{"key":"ref20","first-page":"791","article-title":"A comparative study of $\\pm 1$ steganalyzers","author":"cancelli","year":"2008","journal-title":"in Proc of IEEE 10th Workshop on Multimedia Signal Processing"},{"article-title":"Shape Analysis and Classification","year":"2001","author":"costa","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.06.007"},{"key":"ref24","first-page":"417","author":"gonzalez","year":"2002","journal-title":"Digital Image Processing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.04.022"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411352"},{"key":"ref25","first-page":"3","article-title":"Merging Markov and DCT features for multi-class JPEG steganalysis","author":"pevnya","year":"2007","journal-title":"Proc of SPIE Electronic Imaging Photonics West"}],"event":{"name":"2010 IEEE International Conference on Acoustics, Speech and Signal Processing","start":{"date-parts":[[2010,3,14]]},"location":"Dallas, TX, USA","end":{"date-parts":[[2010,3,19]]}},"container-title":["2010 IEEE International Conference on Acoustics, Speech and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5487364\/5494886\/05495434.pdf?arnumber=5495434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T06:26:42Z","timestamp":1497853602000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5495434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icassp.2010.5495434","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}