{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:31:43Z","timestamp":1729636303829,"version":"3.28.0"},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infrkm.2012.6204989","type":"proceedings-article","created":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T18:52:10Z","timestamp":1338576730000},"page":"277-280","source":"Crossref","is-referenced-by-count":4,"title":["Active warden as the main hindrance for steganography information retrieval"],"prefix":"10.1109","author":[{"given":"M.N.","family":"Zawawi","sequence":"first","affiliation":[]},{"given":"R.","family":"Mahmod","sequence":"additional","affiliation":[]},{"given":"N.","family":"Udzir","sequence":"additional","affiliation":[]},{"given":"F.","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"J.M.","family":"Desa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863485"},{"key":"2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-540-24624-4_3","article-title":"Image Steganography and Steganalysis: Concepts and Practice","volume":"2939","author":"chandramouli","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"6","first-page":"163","article-title":"Virtual Steganographic Laboratory for Digital Images","author":"forczman?ski","year":"2008","journal-title":"Information Systems Architecture and Technology Information Systems and Computer Communication Networks"},{"key":"5","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-36415-3_2","article-title":"Eliminating Steganography in Internet Traffic with Active Wardens","volume":"2578","author":"fisk","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"4","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-540-74124-4_18","article-title":"Batch Steganography and Pooled Steganalysis","author":"ker","year":"2007","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2012 International Conference on Information Retrieval & Knowledge Management (CAMP)","start":{"date-parts":[[2012,3,13]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2012,3,15]]}},"container-title":["2012 International Conference on Information Retrieval &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6200786\/6204970\/06204989.pdf?arnumber=6204989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:35:15Z","timestamp":1497987315000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6204989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/infrkm.2012.6204989","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}