{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:30:24Z","timestamp":1729661424587,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/ijcnn.2008.4634004","type":"proceedings-article","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T16:31:26Z","timestamp":1222705886000},"page":"1562-1567","source":"Crossref","is-referenced-by-count":1,"title":["Building resilient classifiers for LSB matching steganography"],"prefix":"10.1109","author":[{"given":"Rita","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Bernardete","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Catarina","family":"Silva","sequence":"additional","affiliation":[]},{"family":"Qingzhong Liu","sequence":"additional","affiliation":[]},{"given":"Andrew H.","family":"Sung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1023\/A:1021889010444"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/LSP.2006.870357"},{"key":"18","first-page":"23","article-title":"statistics of natural images and models","author":"huang","year":"1999","journal-title":"Computer Vision and Pattern Recognition"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1117\/12.526012"},{"key":"16","first-page":"19","article-title":"blind statistical steganalysis of additive steganography using wavelet higher order statistics","author":"holotyak","year":"2005","journal-title":"9th IFIP TC-6 TC-11 Conf Communications and Multimedia Security"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1007\/3-540-45496-9_2"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/LSP.2005.847889"},{"key":"11","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","article-title":"steganalysis of jpeg images: breaking the f5 algorithm","volume":"2578","author":"fridrich","year":"2002","journal-title":"Proc 5th Int l Workshop on Information Hiding"},{"year":"0","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/978-3-540-35488-8"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/76.350779"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1023\/A:1012487302797"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1016\/S0004-3702(97)00043-X"},{"year":"2002","author":"jolliffe","journal-title":"Principal Component Analysis","key":"24"},{"key":"25","article-title":"neural networks - a comprehensive foundation","author":"haykin","year":"1999","journal-title":"Macmillan College Publishers"},{"year":"1999","author":"vapnik","journal-title":"The Nature of Statistical Learning Theory","key":"26"},{"key":"3","first-page":"1","article-title":"data hiding: current status and key issues","volume":"4","author":"wu","year":"2007","journal-title":"International Journal of Security and Networks"},{"key":"2","first-page":"267","article-title":"image complexity and feature extraction for steganalysis of lsb","volume":"11","author":"liu","year":"2006","journal-title":"ICPR06"},{"year":"0","key":"10"},{"year":"2004","author":"krenn","journal-title":"Steganography and Steganalysis","key":"1"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/49.668971"},{"key":"6","first-page":"289","article-title":"f5 - a steganographic algorithm","author":"westfeld","year":"2001","journal-title":"Springer-Verlag Berlin"},{"key":"5","first-page":"323","article-title":"defending against statistical steganalysis","author":"pravos","year":"2001","journal-title":"Usenix Security Symp"},{"key":"4","first-page":"191","article-title":"digital image steganography using stochastic modulation","author":"fidich","year":"2003","journal-title":"SPIE Electronic Imaging"},{"key":"9","first-page":"42","author":"johnson","year":"2000","journal-title":"A Survey of Steganographic Techniques"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.2991\/jcis.2006.227"}],"event":{"name":"2008 IEEE International Joint Conference on Neural Networks (IJCNN 2008 - Hong Kong)","start":{"date-parts":[[2008,6,1]]},"location":"Hong Kong, China","end":{"date-parts":[[2008,6,8]]}},"container-title":["2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4625775\/4633757\/04634004.pdf?arnumber=4634004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T08:09:53Z","timestamp":1497773393000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4634004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2008.4634004","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}