{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:21:54Z","timestamp":1775578914942,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/icme.2013.6607427","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:40:02Z","timestamp":1380652802000},"page":"1-6","source":"Crossref","is-referenced-by-count":37,"title":["Adaptive steganography by oracle (ASO)"],"prefix":"10.1109","author":[{"given":"Sarra","family":"Kouider","sequence":"first","affiliation":[]},{"given":"Marc","family":"Chaumont","sequence":"additional","affiliation":[]},{"given":"William","family":"Puech","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2037252.2037266"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24178-9_7","article-title":"Breaking HUGO the process discovery","volume":"6958","author":"fridrich","year":"2011","journal-title":"Information Hiding-12th International Conference"},{"key":"1","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","article-title":"Using high-dimensional image models to perform. Highly undetectable steganography","volume":"6387","author":"pevn?y","year":"2010","journal-title":"Information Hiding-12th International Conference"},{"key":"7","first-page":"13","article-title":"Design of adaptive steganographic schemes for digital images","volume":"7880","author":"filler","year":"2011","journal-title":"Media Watermarking Security and Forensics XIII Part of IS&T SPIE Electronic Imaging Symposium"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"5","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","article-title":"Break Our Steganographic System - The ins and outs of organizing BOSS","volume":"6958","author":"bas","year":"2011","journal-title":"Int Workshop Information Hiding"},{"key":"4","first-page":"2","article-title":"Practical methods for minimizing embedding impact in steganography","volume":"6505","author":"fridrich","year":"2007","journal-title":"Security Steganography and Watermarking of Multimedia Contents IX Part of IS&T SPIE Electronic Imaging Symposium"},{"key":"9","first-page":"791","article-title":"A comparative study of steganalyzers","author":"cancelli","year":"2008","journal-title":"IEEE International Workshop on Multimedia Signal Processing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411352"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"}],"event":{"name":"2013 IEEE International Conference on Multimedia and Expo (ICME)","location":"San Jose, CA, USA","start":{"date-parts":[[2013,7,15]]},"end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596168\/6607419\/06607427.pdf?arnumber=6607427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T02:11:34Z","timestamp":1564279894000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6607427\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icme.2013.6607427","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}