{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:42:19Z","timestamp":1729611739027,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/icip.2008.4712197","type":"proceedings-article","created":{"date-parts":[[2008,12,17]],"date-time":"2008-12-17T20:54:55Z","timestamp":1229547295000},"page":"2084-2087","source":"Crossref","is-referenced-by-count":1,"title":["A study on security performance of YASS"],"prefix":"10.1109","author":[{"family":"Fangjun Huang","sequence":"first","affiliation":[]},{"given":"Yun Q.","family":"Shi","sequence":"additional","affiliation":[]},{"family":"Jiwu Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"LIBSVM A library for support vector machines","year":"2001","author":"chang","key":"19"},{"journal-title":"NRCS Photo Gallery","year":"0","key":"17"},{"journal-title":"CorelDraw Image CD","year":"0","key":"18"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1117\/12.696774","article-title":"merging markov and dct features for multi-class jpeg steganalysis","volume":"6505","author":"pevny","year":"2007","journal-title":"Proc SPIE Electronic Imaging Security Steganography Watermarking of Multimedia Contents VI"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"13","article-title":"a markov process based approach to effective attacking jpeg steganography","author":"shi","year":"2006","journal-title":"Information Hiding 8th international Workshop"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2006.285320"},{"key":"11","first-page":"310","article-title":"breaking the f5 algorithm. information hiding, 5th international workshop","volume":"2578","author":"fridrich","year":"2003","journal-title":"LNCS"},{"key":"12","first-page":"67","article-title":"feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. information hiding, 6th international workshop","volume":"3200","author":"fridrich","year":"2004","journal-title":"LNCS"},{"key":"3","article-title":"defending against statistical steganalysis","author":"provos","year":"2001","journal-title":"10th USENIX security symposium"},{"journal-title":"JP Hide & Seek","year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2005.1521412"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-77370-2_2","article-title":"yet another steganographic scheme that resists blind steganalysis","author":"solanki","year":"2007","journal-title":"Information Hiding 9th International Workshop"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467805001719"},{"key":"5","first-page":"289","article-title":"high capacity despite better steganalysis (f5-a steganographic algorithm). information hiding, 4th international workshop","volume":"2137","author":"westfeld","year":"2001","journal-title":"LNCS"},{"year":"0","key":"4"},{"key":"9","first-page":"262","article-title":"steganalysis based on multiple features formed by statistical moments of wavelet characteristic function. information hiding, 7th international workshop","volume":"3727","author":"xuan","year":"2005","journal-title":"LNCS"},{"key":"8","first-page":"340","article-title":"detecting hidden messages using higher-order statistics and support vector machines. information hiding, 5th international workshop","volume":"2578","author":"lyu","year":"2002","journal-title":"LNCS"}],"event":{"name":"2008 15th IEEE International Conference on Image Processing","start":{"date-parts":[[2008,10,12]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2008,10,15]]}},"container-title":["2008 15th IEEE International Conference on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4667700\/4711669\/04712197.pdf?arnumber=4712197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T11:29:09Z","timestamp":1558006149000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4712197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icip.2008.4712197","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}