{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:10:38Z","timestamp":1730279438721,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906416","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T14:59:25Z","timestamp":1412089165000},"page":"554-558","source":"Crossref","is-referenced-by-count":2,"title":["Steganography attack based on Discrete Spring Transform and image geometrization"],"prefix":"10.1109","author":[{"given":"Qilin","family":"Qi","sequence":"first","affiliation":[]},{"given":"Aaron","family":"Sharp","sequence":"additional","affiliation":[]},{"given":"Yaoqing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Dongming","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Sharif","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364070"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583717"},{"key":"16","first-page":"8","article-title":"An active audio steganography attacking method using discrete spring transform","volume":"3456 3460","author":"qilin","year":"2013","journal-title":"Personal Indoor and Mobile Radio Communications (PIMRC) 2013 IEEE 24th International Symposium on"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/InfRKM.2012.6204989"},{"key":"14","first-page":"18","article-title":"Eliminating steganography in internet traffic with active wardens","author":"fisk","year":"2002","journal-title":"Revised Papers from the 5th International Workshop on Information Hiding"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169058"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"3","first-page":"204","volume":"2939","author":"chandramouli","year":"2004","journal-title":"Image Steganography and Steganalysis Concepts and Practice"},{"journal-title":"Interagency Working Group on Cyber Security and Information Assurance","year":"2006","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"10","first-page":"515","article-title":"Sensitivity to light","volume":"1","author":"hood","year":"1986","journal-title":"Handbook of Perception and Human Performance"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288890"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232466"},{"key":"5","first-page":"355","volume":"2578","author":"dumitrescu","year":"2003","journal-title":"Detection of LSB Steganography Via Sample Pair Analysis Information Hiding"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2008.924000"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00124-8"},{"key":"8","first-page":"76","article-title":"Feature-based steganalysis for jpeg images","author":"zhuo","year":"2009","journal-title":"Digital Image Processing 2009 International Conference on"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906416.pdf?arnumber=6906416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:38:56Z","timestamp":1602689936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906416"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906416","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}