{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:13:55Z","timestamp":1751606035090,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1411328.1411353","type":"proceedings-article","created":{"date-parts":[[2008,9,23]],"date-time":"2008-09-23T13:39:01Z","timestamp":1222177141000},"page":"133-138","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Detecting LSB matching by applying calibration technique for difference image"],"prefix":"10.1145","author":[{"given":"Xiaolong","family":"Li","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Tieyong","family":"Zeng","sequence":"additional","affiliation":[{"name":"UniverSud, Cachan, France"}]},{"given":"Bin","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_2_1","series-title":"Proc","first-page":"1","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents VIII","author":"Goljan M.","year":"2006","unstructured":"M. Goljan , J. Fridrich , and T. Holotyak . New blind steganalysis and its implications . In Security, Steganography, and Watermarking of Multimedia Contents VIII , volume 6072 of Proc . SPIE , pages 1 -- 13 , 2006 . M. Goljan, J. Fridrich, and T. Holotyak. New blind steganalysis and its implications. In Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072 of Proc. SPIE, pages 1--13, 2006."},{"key":"e_1_3_2_1_3_1","series-title":"Proc","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1117\/12.476813","volume-title":"Security and Watermarking of Multimedia Contents V","author":"Harmsen J. J.","year":"2003","unstructured":"J. J. Harmsen and W. A. Pearlman . Steganalysis of additive noise modelable information hiding . In Security and Watermarking of Multimedia Contents V , volume 5020 of Proc . SPIE , pages 131 -- 142 , 2003 . J. J. Harmsen and W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In Security and Watermarking of Multimedia Contents V, volume 5020 of Proc. SPIE, pages 131--142, 2003."},{"key":"e_1_3_2_1_4_1","series-title":"Proc","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1117\/12.526720","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents VI","author":"Ker A. D.","year":"2004","unstructured":"A. D. Ker . Quantitative evaluation of Pairs and RS steganalysis . In Security, Steganography, and Watermarking of Multimedia Contents VI , volume 5306 of Proc . SPIE , pages 83 -- 97 , 2004 . A. D. Ker. Quantitative evaluation of Pairs and RS steganalysis. In Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306 of Proc. SPIE, pages 83--97, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_22"},{"key":"e_1_3_2_1_6_1","series-title":"Proc","first-page":"1","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents VII","author":"Ker A. D.","year":"2005","unstructured":"A. D. Ker . Resampling and the detection of LSB matching in color bitmaps . In Security, Steganography, and Watermarking of Multimedia Contents VII , volume 5681 of Proc . SPIE , pages 1 -- 15 , 2005 . A. D. Ker. Resampling and the detection of LSB matching in color bitmaps. In Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681 of Proc. SPIE, pages 1--15, 2005."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.847889"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1782854.1782874"},{"key":"e_1_3_2_1_9_1","unstructured":"X. Li T. Zeng and B. Yang. A further study on steganalysis of LSB matching by calibration. Accepted by IEEE ICIP'08 to appear.  X. Li T. Zeng and B. Yang. A further study on steganalysis of LSB matching by calibration. Accepted by IEEE ICIP'08 to appear."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-017-1043-5","volume-title":"Classical and New Inequalities in Analysis","author":"Mitrinovic D.","year":"1993","unstructured":"D. Mitrinovic , J. Pecaric , and A. Fink . Classical and New Inequalities in Analysis . Kluwer. Academic Publishers , Dordrecht, The Netherlands, 1993 . D. Mitrinovic, J. Pecaric, and A. Fink. Classical and New Inequalities in Analysis. Kluwer. Academic Publishers, Dordrecht, The Netherlands, 1993."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731871"}],"event":{"name":"MM&Sec '08: Multimedia and Security Workshop","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"],"location":"Oxford United Kingdom","acronym":"MM&Sec '08"},"container-title":["Proceedings of the 10th ACM workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1411328.1411353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1411328.1411353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:29Z","timestamp":1750253369000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1411328.1411353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":12,"alternative-id":["10.1145\/1411328.1411353","10.1145\/1411328"],"URL":"https:\/\/doi.org\/10.1145\/1411328.1411353","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}