{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:31Z","timestamp":1750307131302,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,8,5]],"date-time":"2011-08-05T00:00:00Z","timestamp":1312502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,8,5]]},"DOI":"10.1145\/2043674.2043697","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"78-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A JPEG-based statistically invisible steganography"],"prefix":"10.1145","author":[{"given":"Qingzhong","family":"Liu","sequence":"first","affiliation":[{"name":"Sam Houston State University, Huntsville, TX"}]},{"given":"Andrew H.","family":"Sung","sequence":"additional","affiliation":[{"name":"New Mexico Tech, Socorro, NM"}]},{"given":"Zhongxue","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Texas, Houston, TX"}]},{"given":"Xudong","family":"Huang","sequence":"additional","affiliation":[{"name":"Harvard Medical School Boston, MA"}]}],"member":"320","published-online":{"date-parts":[[2011,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2004.10.003"},{"key":"e_1_3_2_1_3_1","first-page":"310","volume-title":"Proc. of 5  th  Information Hiding Workshop","author":"Fridrich J.","year":"2002","unstructured":"J. Fridrich , M. Goljan and D. Hogeam . Steganalysis of JPEG images: breaking the F5 algorithm . Proc. of 5 th Information Hiding Workshop , pp. 310 -- 323 , 2002 . J. Fridrich, M. Goljan and D. Hogeam. Steganalysis of JPEG images: breaking the F5 algorithm. Proc. of 5 th Information Hiding Workshop, pp.310--323, 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"e_1_3_2_1_5_1","first-page":"131","volume-title":"Proc. of SPIE, 5020","author":"Harmsen J.","year":"2003","unstructured":"J. Harmsen and W. Pearlman . Steganalysis of additive noise modelable information hiding . Proc. of SPIE, 5020 , pp. 131 -- 142 , 2003 . J. Harmsen and W. Pearlman. Steganalysis of additive noise modelable information hiding. Proc. of SPIE, 5020, pp.131--142, 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11552055_12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2025841"},{"key":"e_1_3_2_1_9_1","first-page":"2808","volume-title":"Proc. 20  th  IJCAI","author":"Liu Q.","year":"2007","unstructured":"Q. Liu and A. Sung . Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images . Proc. 20 th IJCAI , pp. 2808 -- 2813 , 2007 . Q. Liu and A. Sung. Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. Proc. 20 th IJCAI, pp. 2808--2813, 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.06.005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.08.007"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4634274"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899412.1899420"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631288"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024718"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.001"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000486.2000492"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.696774"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.350779"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731871"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759048.1759067"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1782854.1782857"},{"key":"e_1_3_2_1_24_1","first-page":"440","volume-title":"Proc. of International Conference on Information Technology ITCC (1)","author":"Tadiparthi G.","year":"2004","unstructured":"G. Tadiparthi , S. Mukkamala and A. Sung . Defeating the Current Steganalysis Techniques (Robust Steganography) , Proc. of International Conference on Information Technology ITCC (1) , pp. 440 -- 444 , 2004 . G. Tadiparthi, S. Mukkamala and A. Sung. Defeating the Current Steganalysis Techniques (Robust Steganography), Proc. of International Conference on Information Technology ITCC (1), pp.440--444, 2004."},{"key":"e_1_3_2_1_25_1","volume-title":"Statistical Learning Theory","author":"Vapnik V.","year":"1998","unstructured":"V. Vapnik , Statistical Learning Theory , John Wiley , 1998 . V. Vapnik, Statistical Learning Theory, John Wiley, 1998."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731875"}],"event":{"name":"ICIMCS '11: The Third International Conference on Internet Multimedia Computing and Service","sponsor":["Sichuan University","Chinese Academy of Sciences","SCF Sichuan Computer Federation","Southwest Jiaotong University","Beijing ACM SIGMM Chapter"],"location":"Chengdu China","acronym":"ICIMCS '11"},"container-title":["Proceedings of the Third International Conference on Internet Multimedia Computing and Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043674.2043697","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043674.2043697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:39Z","timestamp":1750240119000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043674.2043697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,5]]},"references-count":26,"alternative-id":["10.1145\/2043674.2043697","10.1145\/2043674"],"URL":"https:\/\/doi.org\/10.1145\/2043674.2043697","relation":{},"subject":[],"published":{"date-parts":[[2011,8,5]]},"assertion":[{"value":"2011-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}