{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:41:26Z","timestamp":1773740486565,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/tifs.2014.2308633","type":"journal-article","created":{"date-parts":[[2014,2,26]],"date-time":"2014-02-26T19:19:24Z","timestamp":1393442364000},"page":"741-751","source":"Crossref","is-referenced-by-count":76,"title":["Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value"],"prefix":"10.1109","volume":"9","author":[{"given":"Keren","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hongxia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","year":"2013","journal-title":"LIBLINEAR-A Library for Large Linear Classification"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2010.03.011"},{"key":"ref11","first-page":"1231","article-title":"Information hiding based on intra prediction modes for H.264\/AVC","author":"zhang","year":"2007","journal-title":"Proc IEEE Int Conf Multimedia Expo"},{"key":"ref12","first-page":"655","article-title":"H.264\/AVC data hiding based on intra prediction modes for real-time applications","author":"bouchama","year":"2012","journal-title":"Proc World Congr Eng Comput Sci"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2005.03.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9372-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1117\/12.540814"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.885020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012199"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.203"},{"key":"ref19","first-page":"96","article-title":"Steganalysis of MSU stegovideo based on discontinuous coefficient","author":"wu","year":"2010","journal-title":"Proc 2nd Int Conf Comput Eng Technol"},{"key":"ref28","first-page":"1","article-title":"Different approaches for motion estimation","author":"shenolikar","year":"2009","journal-title":"Proc 4th Int Conf Control Autom Commun Energy Conserv"},{"key":"ref4","year":"2013","journal-title":"MSU Stegovideo"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2000.826791"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2010.2091127"},{"key":"ref6","first-page":"269","article-title":"Steganography in compressed video stream","author":"xu","year":"2006","journal-title":"Proc 1st Int Conf Innovative Comput Inf Control"},{"key":"ref29","year":"2013","journal-title":"VideoLAN x264 the Best H 264\/AVC Encoder"},{"key":"ref5","author":"jordan","year":"1997","journal-title":"Proposal of a watermarking technique for hiding data in compressed and decompressed video"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2090520"},{"key":"ref7","first-page":"1422","article-title":"Data hiding for digital video with phase of motion vector","author":"fang","year":"2006","journal-title":"Proc IEEE Int Symp Circuits Syst"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref9","first-page":"193","article-title":"Video steganography with perturbed motion estimation","volume":"6958","author":"cao","year":"2011","journal-title":"Proc 13th Int Conf IH"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1373-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.781"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.02.012"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1117\/12.143123","article-title":"Computation-rate-distortion in transform coders for image compression","volume":"1903","author":"gormish","year":"1993","journal-title":"Proc SPIE"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2176116"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1117\/12.453031","article-title":"Enhanced predictive zonal search for single and multiple frame motion estimation","volume":"4671","author":"tourapis","year":"2002","journal-title":"Proc SPIE"},{"key":"ref25","year":"2013","journal-title":"FFMPEG Library"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6776454\/06748977.pdf?arnumber=6748977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:48Z","timestamp":1642004988000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6748977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":30,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2308633","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5]]}}}