{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T20:54:58Z","timestamp":1762376098825,"version":"3.37.3"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61525203","61472235"],"award-info":[{"award-number":["61525203","61472235"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program of Shanghai Dawn Scholar","award":["14SG36"],"award-info":[{"award-number":["14SG36"]}]},{"DOI":"10.13039\/501100012247","name":"Shanghai Academic Research Leader","doi-asserted-by":"crossref","award":["16XD1401200"],"award-info":[{"award-number":["16XD1401200"]}],"id":[{"id":"10.13039\/501100012247","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["16ZR1413100"],"award-info":[{"award-number":["16ZR1413100"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Excellent University Young Teachers Training Program of Shanghai Municipal Education Commission","award":["ZZsdl15105"],"award-info":[{"award-number":["ZZsdl15105"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/lsp.2016.2575100","type":"journal-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T13:03:31Z","timestamp":1464872611000},"page":"989-992","source":"Crossref","is-referenced-by-count":25,"title":["Spatial Steganalysis Using Contrast of Residuals"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4845-4525","authenticated-orcid":false,"given":"Jiang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Fengyong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref12","first-page":"340","article-title":"Detecting hidden messages using higher-order statistics and support vector machines","author":"farid","year":"0","journal-title":"Proceedings of the 5th International Workshop on Information Hiding(IH 2002)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2286682"},{"year":"2010","key":"ref17"},{"year":"2012","key":"ref18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","article-title":"Edge adaptive image steganography based on LSB matching revisited","volume":"5","author":"luo","year":"2010","journal-title":"IEEE Trans Information Forensics and Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2326954"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4711998"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/ASP.2005.2749"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.807363"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/97\/7476977\/07482790.pdf?arnumber=7482790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:39:46Z","timestamp":1641987586000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7482790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":18,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/lsp.2016.2575100","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"type":"print","value":"1070-9908"},{"type":"electronic","value":"1558-2361"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}