{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:05:23Z","timestamp":1769238323942,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,22]],"date-time":"2004-08-22T00:00:00Z","timestamp":1093132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,22]]},"DOI":"10.1145\/1014052.1014117","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"545-550","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Locating secret messages in images"],"prefix":"10.1145","author":[{"given":"Ian","family":"Davidson","sequence":"first","affiliation":[{"name":"SUNY Albany, Albany, NY"}]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[{"name":"SUNY Albany, Albany, NY"}]}],"member":"320","published-online":{"date-parts":[[2004,8,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.jjtc.com\/stegoarchive\/stego\/software.html  http:\/\/www.jjtc.com\/stegoarchive\/stego\/software.html"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4375-6","volume-title":"Information Hiding: Steganography and Watermarking","author":"Johnson N.","year":"2001","unstructured":"Johnson , N. , Duric , Z. , and Jajodia , S . Information Hiding: Steganography and Watermarking , 2001 . Johnson, N., Duric, Z., and Jajodia, S. Information Hiding: Steganography and Watermarking, 2001."},{"key":"e_1_3_2_1_3_1","volume-title":"CNN, July 23","author":"Starr B.","year":"2002","unstructured":"Starr , B. , and Utley , G . CNN, July 23 , 2002 : http:\/\/www.cnn.com\/2002\/US\/07\/23\/binladen.internet Starr, B., and Utley, G. CNN, July 23, 2002: http:\/\/www.cnn.com\/2002\/US\/07\/23\/binladen.internet"},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.cise.nsf.gov\/accomp\/index.cfm?div=iis  http:\/\/www.cise.nsf.gov\/accomp\/index.cfm?div=iis"},{"key":"e_1_3_2_1_5_1","unstructured":"Kelley J. USA Today July 10 2002: http:\/\/www.usatoday.com\/news\/world\/2002\/07\/10\/web-terror-cover.htm  Kelley J. USA Today July 10 2002: http:\/\/www.usatoday.com\/news\/world\/2002\/07\/10\/web-terror-cover.htm"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. 10th USENIX Security Symposium","author":"Provos N.","year":"2001","unstructured":"Provos , N. Defending against Statistical Steganalysis . Proc. 10th USENIX Security Symposium , 2001 . Provos, N. Defending against Statistical Steganalysis. Proc. 10th USENIX Security Symposium, 2001."},{"key":"e_1_3_2_1_7_1","volume-title":"Attacks on Steganographic Systems. 3rd Information Hiding Workshop","author":"Westfeld A.","year":"1999","unstructured":"Westfeld , A. , and Putzmann , A . Attacks on Steganographic Systems. 3rd Information Hiding Workshop , 1999 . Westfeld, A., and Putzmann, A. Attacks on Steganographic Systems. 3rd Information Hiding Workshop, 1999."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. 5th Information Hiding Workshop","author":"Lyu S.","year":"2002","unstructured":"Lyu , S. , and Farid , H . Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines . Proc. 5th Information Hiding Workshop , 2002 , 340--354. Lyu, S., and Farid, H. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. Proc. 5th Information Hiding Workshop, 2002, 340--354."},{"key":"e_1_3_2_1_9_1","first-page":"56","volume":"51","author":"Berg G.","year":"2003","unstructured":"Berg , G. , Davidson , I. , Duan , M. , and Paul , G. , Searching for Hidden Messages: Automatic Detection of Steganography. 15th Innovative App. of A.I. , 2003 , 51 -- 56 . Berg, G., Davidson, I., Duan, M., and Paul, G., Searching for Hidden Messages: Automatic Detection of Steganography. 15th Innovative App. of A.I., 2003, 51--56.","journal-title":"Innovative App. of A.I."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. SPIE Photonics West","volume":"4675","author":"Fridrich J.","year":"2002","unstructured":"Fridrich , J. , and Goljan , M . Practical Steganalysis of Digital Images - State of the Art . Proc. SPIE Photonics West , Vol. 4675 , 2002 , 1--13 Fridrich, J., and Goljan, M. Practical Steganalysis of Digital Images - State of the Art. Proc. SPIE Photonics West, Vol. 4675, 2002, 1--13"},{"key":"e_1_3_2_1_11_1","volume-title":"Morgan Kauffman","author":"Han J.","year":"2000","unstructured":"Han , J. , and Kamber , M . Data Mining: Concepts and Techniques , Morgan Kauffman , 2000 . Han, J., and Kamber, M. Data Mining: Concepts and Techniques, Morgan Kauffman, 2000."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375668"},{"key":"e_1_3_2_1_13_1","first-page":"712","volume":"709","author":"Williams G.","year":"2002","unstructured":"Williams , G. , Baxter , R. , He , H. , Hawkins , S. and Gu , L., A Comparative Study of Replicator Neural Networks for Outlier Detection in Data Mining, Proc . 2nd IEEE ICDM , 2002 , 709 -- 712 . Williams, G., Baxter, R., He, H., Hawkins, S. and Gu, L., A Comparative Study of Replicator Neural Networks for Outlier Detection in Data Mining, Proc. 2nd IEEE ICDM, 2002, 709--712.","journal-title":"IEEE ICDM"},{"key":"e_1_3_2_1_14_1","first-page":"222","volume":"219","author":"Knorr E. M.","year":"1997","unstructured":"Knorr , E. M. , and Ng , R. T. A unified notion of outliers: Properties and computation , Proc. KDD , 1997 , 219 -- 222 . Knorr, E. M., and Ng, R. T. A unified notion of outliers: Properties and computation, Proc. KDD, 1997, 219--222.","journal-title":"Proc. KDD"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502567"},{"key":"e_1_3_2_1_16_1","volume-title":"Fundamentals of digital image processing","author":"Jain A.","year":"1989","unstructured":"Jain , A. Fundamentals of digital image processing , 1989 . Jain, A. Fundamentals of digital image processing, 1989."},{"key":"e_1_3_2_1_17_1","first-page":"70","volume":"63","author":"Li Q.","year":"2003","unstructured":"Li , Q. , Ye , J. , and Kambhamettu , C. Spatially Interest Pixels (SIPs): Useful Low-Level Features of Visual Media Data, 3rd IEEE ICDM , 2003 , 63 -- 70 . Li, Q., Ye, J., and Kambhamettu, C. Spatially Interest Pixels (SIPs): Useful Low-Level Features of Visual Media Data, 3rd IEEE ICDM, 2003, 63--70.","journal-title":"IEEE ICDM"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/2322600"},{"key":"e_1_3_2_1_19_1","unstructured":"Neal R. Probabilistic Inference Using Markov Chain Monte Carlo Method TR CRG-TR-93-1 U. of Toronto.  Neal R. Probabilistic Inference Using Markov Chain Monte Carlo Method TR CRG-TR-93-1 U. of Toronto."}],"event":{"name":"KDD04: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Seattle WA USA","acronym":"KDD04","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014117","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1014052.1014117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:30Z","timestamp":1750264290000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,22]]},"references-count":19,"alternative-id":["10.1145\/1014052.1014117","10.1145\/1014052"],"URL":"https:\/\/doi.org\/10.1145\/1014052.1014117","relation":{},"subject":[],"published":{"date-parts":[[2004,8,22]]},"assertion":[{"value":"2004-08-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}