{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T13:21:27Z","timestamp":1751808087234,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1109\/icip.2009.5414128","type":"proceedings-article","created":{"date-parts":[[2010,2,17]],"date-time":"2010-02-17T18:32:08Z","timestamp":1266431528000},"page":"109-112","source":"Crossref","is-referenced-by-count":4,"title":["Improving embedding efficiency via matrix embedding: A case study"],"prefix":"10.1109","author":[{"family":"Yunkai Gao","sequence":"first","affiliation":[]},{"family":"Xiaolong Li","sequence":"additional","affiliation":[]},{"family":"Tieyong Zeng","sequence":"additional","affiliation":[]},{"family":"Bin Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","article-title":"F5 - A steganographic algorithm","volume":"2137","author":"westfeld","year":"2001","journal-title":"Proc 4th Int Workshop on Information Hiding"},{"article-title":"Some notes on steganography","year":"1998","author":"crandall","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2006.12.008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2003.1216717"},{"journal-title":"Covering Codes","year":"1997","author":"cohen","key":"ref11"},{"key":"ref5","first-page":"147","article-title":"Embedding information in grayscale images","author":"van dijk","year":"2001","journal-title":"Proc 22nd Symposium on Information Theory in the Benelux"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2008.02.004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69019-1_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879281"},{"key":"ref2","first-page":"282","article-title":"On steganographic embedding efficiency","volume":"4437","author":"fridrich","year":"2006","journal-title":"Springer LNCS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.842707"},{"journal-title":"Digital Watermarking and Steganography","year":"2007","author":"cox","key":"ref1"}],"event":{"name":"2009 16th IEEE International Conference on Image Processing ICIP 2009","start":{"date-parts":[[2009,11,7]]},"location":"Cairo, Egypt","end":{"date-parts":[[2009,11,10]]}},"container-title":["2009 16th IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5403221\/5413332\/05414128.pdf?arnumber=5414128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T04:56:47Z","timestamp":1497848207000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5414128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icip.2009.5414128","relation":{},"subject":[],"published":{"date-parts":[[2009,11]]}}}