{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:00:26Z","timestamp":1729638026141,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/ijcnn.2008.4634274","type":"proceedings-article","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T20:31:26Z","timestamp":1222720286000},"page":"3352-3357","source":"Crossref","is-referenced-by-count":10,"title":["Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting"],"prefix":"10.1109","author":[{"given":"Qingzhong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Andrew H.","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Bernardete M.","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Rita","family":"Ferreira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1904-8","author":"joliffe","year":"1986","journal-title":"Principal Component Analysis"},{"journal-title":"Pattern Classification","year":"2001","author":"duda","key":"22"},{"key":"17","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/11552055_12","article-title":"a graph-theoretic approach to steganography","volume":"3677","author":"hetzl","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Statistical Learning Theory","year":"1998","author":"vapnik","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/76.350779"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_21"},{"key":"13","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","article-title":"feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes","volume":"3200","author":"fridrich","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"14","article-title":"merging markov and dct features for multi-class jpeg steganalysis","volume":"6505","author":"pevny","year":"2007","journal-title":"Proc SPIE Electronic Imaging Electronic Imaging Security Steganography and Watermarking of Multimedia Contents IX"},{"key":"11","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-540-30114-1_8","article-title":"improved detection of lsb steganography in grayscale images","volume":"3200","author":"ker","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839896"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00142-9"},{"journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","author":"katzenbeisser","key":"3"},{"key":"20","first-page":"251","author":"lee","year":"2004","journal-title":"Analysis of Microarray Gene Expression Data"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74124-4_17"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.08.007"},{"key":"7","first-page":"2808","article-title":"feature mining and nuero-fuzzy inference system for steganalysis of lsb matching steganography in grayscale images","author":"liu","year":"2007","journal-title":"Proc of 20th International Joint Conference on Artificial Intelligence (IJCAI)"},{"key":"6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1117\/12.476813","article-title":"steganalysis of additive noise modelable information hiding","volume":"5020","author":"harmsen","year":"2003","journal-title":"Proc SPIE Security Steganography Watermarking Multimedia Contents"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1117\/12.525996"},{"key":"4","first-page":"310","article-title":"steganalysis of jpeg images: breaking the f5 algorithm","author":"fridrich","year":"2002","journal-title":"Proc of 5th Information Hiding Workshop"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.06.005"},{"key":"8","first-page":"1208","article-title":"image complexity and feature extraction for steganalysis of lsb matching steganography","author":"liu","year":"2006","journal-title":"Proc of 18th International Conference on Pattern Recognition ICPR (1)"}],"event":{"name":"2008 IEEE International Joint Conference on Neural Networks (IJCNN 2008 - Hong Kong)","start":{"date-parts":[[2008,6,1]]},"location":"Hong Kong, China","end":{"date-parts":[[2008,6,8]]}},"container-title":["2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4625775\/4633757\/04634274.pdf?arnumber=4634274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T09:01:00Z","timestamp":1557824460000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4634274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2008.4634274","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}