{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:11:32Z","timestamp":1729631492009,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412648","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T14:44:59Z","timestamp":1359125099000},"page":"193-198","source":"Crossref","is-referenced-by-count":16,"title":["Weighted stego-image steganalysis for naive content-adaptive embedding"],"prefix":"10.1109","author":[{"given":"Pascal","family":"Schottle","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Korff","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Bohme","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774427"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161369"},{"journal-title":"Boss [Online]","year":"2010","author":"bas","key":"18"},{"key":"15","article-title":"A game-theoretic approach to content-adaptive steganography","author":"scho?ttle","year":"2012","journal-title":"Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34266-0_1"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_7"},{"key":"14","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/3-540-36415-3_18","article-title":"Steganography preserving statistical properties","volume":"2578","author":"franz","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"11","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/10719724_4","article-title":"Secure steganographic methods for palette images","volume":"1768","author":"fridrich","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","article-title":"Using high-dimensional image models to perform highly undetectable steganography","volume":"6387","author":"pevny?","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/3-540-61996-8_28","article-title":"Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best","volume":"1174","author":"franz","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2174231"},{"key":"1","first-page":"23","volume":"5306","author":"fridrich","year":"2004","journal-title":"On Estimation of Secret Message Length in LSB Steganography in Spatial Domain"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2007.375384"},{"key":"7","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-540-88961-8_13","article-title":"Weighted stego-image steganalysis for JPEG covers","volume":"5284","author":"bo?hme","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"6","first-page":"681905","volume":"6819","author":"ker","year":"2008","journal-title":"Revisiting Weighted Stego-Image Steganalysis[C]"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2007.4299815"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14313-7","author":"bo?hme","year":"2010","journal-title":"Advanced Statistical Steganalysis"},{"key":"9","first-page":"591609","volume":"5916","author":"agaian","year":"2005","journal-title":"T-order Statistics and Secure Adaptive Steganography"},{"key":"8","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/10719724_16","article-title":"A stochastic approach to content adaptive digital image watermarking","volume":"1768","author":"voloshynovskiy","year":"2000","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2012,12,2]]},"location":"Costa Adeje - Tenerife, Spain","end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412648.pdf?arnumber=6412648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:24:46Z","timestamp":1498011886000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412648\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412648","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}