{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:04:04Z","timestamp":1778789044405,"version":"3.51.4"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412655","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T19:44:59Z","timestamp":1359143099000},"page":"234-239","source":"Crossref","is-referenced-by-count":738,"title":["Designing steganographic distortion using directional filters"],"prefix":"10.1109","author":[{"given":"Vojtech","family":"Holub","sequence":"first","affiliation":[]},{"given":"Jessica","family":"Fridrich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597841"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288246"},{"key":"13","first-page":"201","article-title":"Edge adaptive image steganography based on LSB matching revisited","volume":"5","author":"luo","year":"2010","journal-title":"IEEE TIFS"},{"key":"14","first-page":"161","article-title":"Using high-dimensional image models to perform highly undetectable steganography","volume":"6387","author":"pevny?","year":"2010","journal-title":"Springer LNCS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2037252.2037266"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"3","article-title":"Design of adaptive steganographic schemes for digital images","volume":"7880","author":"filler","year":"2011","journal-title":"Proc SPIE Elec Img Media Watermarking Sec and Forensics of Multimedia XIII"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077629"},{"key":"1","author":"bo?hme","year":"2008","journal-title":"Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411352"},{"key":"7","first-page":"102","article-title":"Steganalysis of content-adaptive steganography in spatial domain","volume":"6958","author":"fridrich","year":"2011","journal-title":"Springer LNCS"},{"key":"6","first-page":"868","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"fridrich","year":"2011","journal-title":"IEEE TIFS"},{"key":"5","author":"filler","year":"2010","journal-title":"BOSS (Break Our Steganography System)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"9","first-page":"314","article-title":"Modified matrix encoding technique for minimal distortion steganography","volume":"4437","author":"kim","year":"2006","journal-title":"Springer LNCS"},{"key":"8","first-page":"71","article-title":"A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)","volume":"6958","author":"gu?l","year":"2011","journal-title":"Springer LNCS"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"Costa Adeje - Tenerife, Spain","start":{"date-parts":[[2012,12,2]]},"end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412655.pdf?arnumber=6412655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:11:37Z","timestamp":1490141497000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412655\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412655","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}