{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:59:14Z","timestamp":1729630754209,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/wifs.2009.5386467","type":"proceedings-article","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T21:14:24Z","timestamp":1264194864000},"page":"131-135","source":"Crossref","is-referenced-by-count":12,"title":["Wet ZZW construction for steganography"],"prefix":"10.1109","author":[{"given":"Tomas","family":"Filler","sequence":"first","affiliation":[]},{"given":"Jessica","family":"Fridrich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"2","article-title":"Practical methods for minimizing embedding impact in steganography","volume":"6505","author":"fridrich","year":"2007","journal-title":"SPIE E197 Proceedings"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2011082"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161405"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863487"},{"key":"ref11","first-page":"60","article-title":"Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes","volume":"5284","author":"zhang","year":"2008","journal-title":"10th IHW"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/11558859_16","article-title":"Efficient wet paper codes","volume":"3727","author":"fridrich","year":"2005","journal-title":"7th Information Hiding Workshop"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/el:20070248"},{"key":"ref8","article-title":"How Reed-Solomon codes can improve steganographic schemes","author":"galand","year":"2009","journal-title":"EURASIP Journal on Information Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855393"},{"key":"ref2","first-page":"8 1","article-title":"The Square Root Law of steganographic capacity for Markov covers","volume":"7254","author":"filler","year":"2009","journal-title":"Proc SPIE Electronic"},{"key":"ref9","first-page":"3","article-title":"Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities","author":"kodovsk\u00fd","year":"2007","journal-title":"Proc the 9th ACM Workshop on Multimedia and Security"},{"journal-title":"Properties of random matrices and applications Unpublished report","year":"0","author":"blake","key":"ref1"}],"event":{"name":"2009 First IEEE International Workshop on Information Forensics and Security (WIFS 2009)","start":{"date-parts":[[2009,12,6]]},"location":"London","end":{"date-parts":[[2009,12,9]]}},"container-title":["2009 First IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5377995\/5386439\/05386467.pdf?arnumber=5386467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T03:59:42Z","timestamp":1497844782000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5386467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wifs.2009.5386467","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}