{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:11:14Z","timestamp":1729645874539,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/icip.2010.5651567","type":"proceedings-article","created":{"date-parts":[[2010,12,10]],"date-time":"2010-12-10T23:00:11Z","timestamp":1292022011000},"page":"1761-1764","source":"Crossref","is-referenced-by-count":24,"title":["Reliable histogram features for detecting LSB matching"],"prefix":"10.1109","author":[{"given":"Kaiwei","family":"Cai","sequence":"first","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tieyong","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaoqing","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4378976"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1117\/12.765817"},{"key":"14","first-page":"184","article-title":"Steganalysis based on difference image","author":"sun","year":"2008","journal-title":"Proc IWDW"},{"key":"11","first-page":"2064","article-title":"Blind image steganalysis based on run length histogram analysis","author":"dong","year":"2008","journal-title":"Proc IEEE ICIP"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2008.4665180"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411353"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.847889"},{"key":"1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1117\/12.476813","article-title":"Steganalysis of additive noise modelable information hiding","volume":"5","author":"harmsen","year":"2003","journal-title":"Security and Watermarking of Multimedia Contents"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379530"},{"key":"7","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/11558859_20","article-title":"Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions","author":"xuan","year":"2005","journal-title":"Proc Int Workshop on Information Hiding"},{"key":"6","first-page":"1505","article-title":"Detecting LSB matching by characterizing the amplitude of histogram","author":"gao","year":"2009","journal-title":"Proc IEEE ICASSP"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4711998"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2007.4412897"},{"key":"9","first-page":"1","article-title":"New blind steganalysis and its implications","volume":"8","author":"goljan","year":"2006","journal-title":"Proc SPIE Security Steganography Watermarking Multimedia Contents"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863485"}],"event":{"name":"2010 17th IEEE International Conference on Image Processing (ICIP 2010)","start":{"date-parts":[[2010,9,26]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 IEEE International Conference on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5641636\/5648792\/05651567.pdf?arnumber=5651567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:08:32Z","timestamp":1497877712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5651567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icip.2010.5651567","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}