{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:37:44Z","timestamp":1762004264695},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2010,8,1]],"date-time":"2010-08-01T00:00:00Z","timestamp":1280620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/tmm.2010.2051243","type":"journal-article","created":{"date-parts":[[2010,5,28]],"date-time":"2010-05-28T14:40:31Z","timestamp":1275057631000},"page":"345-357","source":"Crossref","is-referenced-by-count":43,"title":["A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm"],"prefix":"10.1109","volume":"12","author":[{"family":"Guo-Shiang Lin","sequence":"first","affiliation":[]},{"family":"Yi-Ting Chang","sequence":"additional","affiliation":[]},{"family":"Wen-Nung Lie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/25308"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1276109"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/6046.944472"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.921733"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.810588"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_21"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/83.841940"},{"key":"ref11","first-page":"25","article-title":"genetic algorithm based methodology for breaking the steganalytic systems","volume":"36","author":"wu","year":"2006","journal-title":"IEEE Trans Syst Man Cybern B"},{"key":"ref12","author":"upham","year":"1997","journal-title":"Jsteg"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952595"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/12.465263","article-title":"practical steganalysis of digital images-state of the art","volume":"4675","author":"fridrich","year":"2002","journal-title":"Proc SPIE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36228-2_54"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1117\/12.465273","article-title":"a mathematical approach to steganalysis","volume":"4675","author":"chandramouli","year":"2002","journal-title":"Proc SPIE"},{"key":"ref17","first-page":"21","article-title":"steganalysis of additive noise modelable information hiding","volume":"5020","author":"harmsen","year":"2003","journal-title":"Proc SPIE"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863485"},{"key":"ref19","author":"duda","year":"2001","journal-title":"Pattern Classification"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1996.546908"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879297"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2008.924000"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.858377"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1996.0121"},{"key":"ref29","first-page":"158","article-title":"fast and robust watermarking of jpeg files","author":"luo","year":"2002","journal-title":"Proc 5th IEEE Southwest Symp Image Analysis and Interpretation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2005.1465753"},{"key":"ref8","first-page":"38","article-title":"human visual system models in digital image watermarking","volume":"13","author":"levicky","year":"2004","journal-title":"Radioengineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.821551"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.807363"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2001.918771"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415460"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/6046.944472"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312386"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1049\/ip-ifs:20055147","article-title":"determining the stego algorithm for jpeg images","volume":"153","author":"pevny","year":"2006","journal-title":"IEE Proceedings Information Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.890519"},{"key":"ref26","author":"sonka","year":"2008","journal-title":"Image Processing Analysis and Machine Vision"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.885020"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6046\/5510078\/05471125.pdf?arnumber=5471125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:46:07Z","timestamp":1633913167000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5471125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":35,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmm.2010.2051243","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"value":"1520-9210","type":"print"},{"value":"1941-0077","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8]]}}}