{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:35:20Z","timestamp":1729661720003,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/icip.2007.4379114","type":"proceedings-article","created":{"date-parts":[[2008,7,21]],"date-time":"2008-07-21T21:16:34Z","timestamp":1216674994000},"page":"II - 149-II - 152","source":"Crossref","is-referenced-by-count":6,"title":["Steganalysis of \u00b11 Embedding using Lossless Image Compression"],"prefix":"10.1109","author":[{"given":"Charles","family":"Boncelet","sequence":"first","affiliation":[]},{"given":"Lisa","family":"Marvel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1117\/12.596993","article-title":"On steganalysis of plus-minus one embedding of continuous tone images","volume":"5861","author":"wong","year":"2005","journal-title":"Security Steganography and Watermarking of Multimedia Contents VII"},{"key":"ref3","first-page":"355","article-title":"Detection oflsb steganography via sample pair analysis","author":"dumitrescu","year":"2003","journal-title":"IH '02 Revised Papers from the 5th International Workshop on Information Hiding"},{"article-title":"LIBSVM: a library for support vector machines","year":"2001","author":"chang","key":"ref10"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1117\/12.643254","article-title":"New blind steganalysis and its implications","volume":"6072","author":"goljan","year":"2006","journal-title":"Security Steganography and Watermarking of Multimedia Contents VIII"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.1998.0303"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1117\/12.584201","article-title":"Stochastic approach to secret message length estimation in &#x00B1;k embedding steganography","volume":"5681","author":"holotyak","year":"2005","journal-title":"Security Steganography and Watermarking of Multimedia Contents VII"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.382012"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312818"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/11558859_22","article-title":"A general framework for structural steganalysis of lsb replacement","author":"ker","year":"2005","journal-title":"Proceedings of 7th International Information Hiding Workshop LNCS"},{"key":"ref9","article-title":"On the use of context - weighting in lossless bilevel image compression","author":"xiao","year":"2004","journal-title":"IEEE Trans on Image Proc"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"}],"event":{"name":"2007 IEEE International Conference on Image Processing","start":{"date-parts":[[2007,9,16]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2007,10,19]]}},"container-title":["2007 IEEE International Conference on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4378863\/4379065\/04379114.pdf?arnumber=4379114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T18:50:07Z","timestamp":1619808607000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4379114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icip.2007.4379114","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}