{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:51:54Z","timestamp":1754484714505,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/wifs.2010.5711444","type":"proceedings-article","created":{"date-parts":[[2011,2,11]],"date-time":"2011-02-11T23:09:17Z","timestamp":1297465757000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["Minimizing additive distortion functions with non-binary embedding operation in steganography"],"prefix":"10.1109","author":[{"given":"Tomas","family":"Filler","sequence":"first","affiliation":[]},{"given":"Jessica","family":"Fridrich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"2","article-title":"Practical methods for minimizing embedding impact in steganography","volume":"6505","author":"fridrich","year":"2007","journal-title":"Proc SPIE Electron Imag"},{"key":"ref11","first-page":"102","volume":"1","author":"fridrich","year":"2006","journal-title":"Wet paper codes with improved embedding efficiency [5]"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855393"},{"key":"ref13","first-page":"390","volume":"1","author":"fridrich","year":"2006","journal-title":"Matrix embedding for large payloads [5]"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1007\/978-3-540-74124-4_21","article-title":"Modified matrix encoding technique for minimal distortion steganography","volume":"4437","author":"kim","year":"2006","journal-title":"International Workshop in Information Hiding"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597831"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-16435-4_13","article-title":"Using high-dimensional image models to perform highly undetectable steganography","author":"pevn\u00fd","year":"2010","journal-title":"Information Hiding-12th International Conference"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161405"},{"key":"ref18","first-page":"142","article-title":"Coding theorems for a discrete source with a fidelity criterion","volume":"4","author":"shannon","year":"1959","journal-title":"IRE Nat Conv Rec"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","article-title":"High capacity despite better steganalysis (F5 - a steganographic algorithm)","volume":"2137","author":"westfeld","year":"2001","journal-title":"Information Hiding 4th International Workshop"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2009.5386467"},{"key":"ref3","article-title":"Some notes on steganography","author":"crandall","year":"1998","journal-title":"Steganography Mailing List"},{"journal-title":"Gibbs construction in steganography [5]","year":"2010","author":"filler","key":"ref6"},{"journal-title":"IEEE Trans on Information Forensics and Security","year":"0","key":"ref5"},{"key":"ref8","first-page":"5?01","article-title":"Minimizing embedding impact in steganography using trellis-coded quantization","volume":"7541","author":"filler","year":"2010","journal-title":"Proc SPIE Electron Imag"},{"journal-title":"Minimizing additive distortion in steganography using syndrome-trellis codes","year":"2010","author":"filler","key":"ref7"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"ref2"},{"journal-title":"BOWS-2","year":"2007","author":"bas","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref20","first-page":"31","article-title":"Fast BCH syndrome coding for steganography","volume":"5806","author":"zhang","year":"2009","journal-title":"Information Hiding 11th International Workshop"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/el:20070248"},{"key":"ref21","first-page":"564","volume":"4","author":"zhang","year":"2009","journal-title":"Generalization of the ZZW embedding construction for steganography [5]"}],"event":{"name":"2010 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2010,12,12]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2010,12,15]]}},"container-title":["2010 IEEE International Workshop on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5707112\/5711434\/05711444.pdf?arnumber=5711444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T14:19:43Z","timestamp":1560003583000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5711444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wifs.2010.5711444","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}