{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:02:23Z","timestamp":1730250143085,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/icme.2008.4607408","type":"proceedings-article","created":{"date-parts":[[2008,8,28]],"date-time":"2008-08-28T05:19:53Z","timestamp":1219900793000},"page":"209-212","source":"Crossref","is-referenced-by-count":9,"title":["Improvement of the embedding efficiency of LSB matching by sum and difference covering set"],"prefix":"10.1109","author":[{"given":"Xiaolong","family":"Li","sequence":"first","affiliation":[]},{"given":"Tieyong","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"61","article-title":"additive bases and extremal problems in groups, graphs and networks","volume":"66","author":"frank hsu","year":"2004","journal-title":"Utilitas Mathematica"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/BF02941296"},{"key":"13","first-page":"65","article-title":"minimum sum covers of small cyclic groups","volume":"147","author":"fitch","year":"2000","journal-title":"Congressus Numerantium"},{"year":"0","key":"14"},{"key":"11","first-page":"204","article-title":"a fusion of maximum likelihood and structural steganalysis","volume":"4567","author":"ker","year":"2007","journal-title":"Springer LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1137\/0601045"},{"journal-title":"Some Notes on Steganography","year":"0","author":"crandall","key":"3"},{"key":"2","first-page":"289","article-title":"high capacity despite better steganalysis: f5- a steganographic algorithm","volume":"2137","author":"westfeld","year":"2001","journal-title":"Springer LNCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.892768"},{"key":"7","first-page":"13","article-title":"an implementation of key-based digital signal steganography","volume":"2137","author":"sharp","year":"2001","journal-title":"Springer LNCS"},{"journal-title":"Covering Codes","year":"1997","author":"cohen","key":"6"},{"key":"5","article-title":"constructing good covering codes for applications in steganography","author":"bierbrauer","year":"2007","journal-title":"LNCS Transactions on Data Hiding and Multimedia Security"},{"key":"4","first-page":"282","article-title":"on steganographic embedding efficiency","volume":"4437","author":"fridrich","year":"2006","journal-title":"Springer LNCS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.060863"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.847889"}],"event":{"name":"2008 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2008,6,23]]},"location":"Hannover, Germany","end":{"date-parts":[[2008,4,26]]}},"container-title":["2008 IEEE International Conference on Multimedia and Expo"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4599583\/4607348\/04607408.pdf?arnumber=4607408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T19:24:49Z","timestamp":1489692289000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4607408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icme.2008.4607408","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}