{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:54:33Z","timestamp":1761897273904,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9053696","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T20:21:13Z","timestamp":1586463673000},"page":"2762-2766","source":"Crossref","is-referenced-by-count":9,"title":["Steganography and its Detection in JPEG Images Obtained with the \"TRUNC\" Quantizer"],"prefix":"10.1109","author":[{"given":"Jan","family":"Butora","sequence":"first","affiliation":[]},{"given":"Jessica","family":"Fridrich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Universal distortion design for steganography in an arbitrary domain","author":"holub","year":"2014","journal-title":"EURASIP Journal on Information Security Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop 2014 1"},{"key":"ref11","article-title":"On the relationship between embedding costs and steganographic capacity","author":"ker","year":"2017","journal-title":"The 7th ACM Workshop on Information Hiding and Multimedia Security"},{"year":"2017","author":"ker","journal-title":"The square root law of steganography","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1411328.1411349"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1117\/12.907495"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIFS.2011.2175919"},{"year":"1993","author":"pennebaker","journal-title":"JPEG Still Image Data Compression Standard","key":"ref16"},{"year":"2015","author":"song","journal-title":"Steganalysis of adaptive JPEG steganography using 2D Gabor filters","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TIFS.2017.2710946"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICASSP.2018.8461438"},{"key":"ref4","article-title":"Is ensemble classifier needed for steganalysis in highdimensional feature spaces?","author":"cogranne","year":"2015","journal-title":"IEEE International Workshop on Information Forensics and Security"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3335203.3335714"},{"key":"ref6","first-page":"1","article-title":"The Square Root Law of steganographic capacity for Markov covers","volume":"7254","author":"filler","year":"2009","journal-title":"Proc SPIE Electronic Imaging Media Forensics and Security XI"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/WIFS.2015.7368589"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/WIFS.2012.6412644"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1288869.1288872"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"ref1","article-title":"Photo forensics from rounding artifacts","author":"agarwal","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIFS.2014.2312817"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2020,5,4]]},"location":"Barcelona, Spain","end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09053696.pdf?arnumber=9053696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:07:16Z","timestamp":1656374836000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9053696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9053696","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}