{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:21:50Z","timestamp":1775578910125,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/icip.2014.7025854","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T17:41:49Z","timestamp":1423158109000},"page":"4206-4210","source":"Crossref","is-referenced-by-count":490,"title":["A new cost function for spatial image steganography"],"prefix":"10.1109","author":[{"given":"Bin","family":"Li","sequence":"first","affiliation":[]},{"given":"Ming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482514"},{"key":"ref11","article-title":"Non-uniform quantization in breaking hugo","author":"chen","year":"2013","journal-title":"Proc of the 10th International Workshop on Digital Forensics and Watermarking"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2326954"},{"key":"ref14","first-page":"9?1","article-title":"Optimizing pixel predictors for steganalysis","volume":"8303","author":"holub","year":"2012","journal-title":"Proc of the SPIE Media Watermarking Security and Forensics"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","article-title":"Break our stegano-graphic system -the ins and outs of organizing boss","volume":"lncs 6958","author":"bas","year":"2011","journal-title":"Proc of the International Workshop on Information Hiding"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1117\/12.697471"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161369"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","article-title":"Using high-dimensional image models to perform highly undetectable steganog-raphy","volume":"lncs 6387","author":"pevny","year":"2010","journal-title":"Proc of the International Workshop on Information Hiding"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077629"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref2","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"li","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"}],"event":{"name":"2014 IEEE International Conference on Image Processing (ICIP)","location":"Paris, France","start":{"date-parts":[[2014,10,27]]},"end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6992914\/7024995\/07025854.pdf?arnumber=7025854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T17:27:34Z","timestamp":1566322054000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7025854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icip.2014.7025854","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}