{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:39Z","timestamp":1750306779350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,17]],"date-time":"2013-08-17T00:00:00Z","timestamp":1376697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["XDA06030601"],"award-info":[{"award-number":["XDA06030601"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["20110491838, 2012T50842","61272489, 61170032"],"award-info":[{"award-number":["20110491838, 2012T50842","61272489, 61170032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific and Technological Innovation Leading Talent of Zhengzhou","award":["10LJRC182"],"award-info":[{"award-number":["10LJRC182"]}]},{"name":"Doctoral Dissertation Innovation Fund of Zhengzhou Information Science and Technology Institute","award":["BSLWCX201203"],"award-info":[{"award-number":["BSLWCX201203"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,17]]},"DOI":"10.1145\/2499788.2499821","type":"proceedings-article","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T12:58:57Z","timestamp":1377608337000},"page":"71-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Steganalysis of F5-like steganography based on selection of joint distribution features"],"prefix":"10.1145","author":[{"given":"Yuan","family":"Liu","sequence":"first","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Jicang","family":"Lu","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Daofu","family":"Gong","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2013,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"e_1_3_2_1_3_1","first-page":"01","volume-title":"Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII","author":"Filler T.","year":"2011"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288872"},{"first-page":"0A","volume-title":"Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV","author":"Kodovsk\u00fd J.","key":"e_1_3_2_1_6_1"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"Li B.","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899412.1899420"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110807"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2008.03.016"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929304.1929317"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2002936"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467805001719"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.890517"},{"key":"e_1_3_2_1_16_1","first-page":"289","volume-title":"Proceedings of the 4th International Workshop on Information Hiding","author":"Westfeld A.","year":"2003"}],"event":{"name":"ICIMCS '13: International Conference on Internet Multimedia Computing and Service","sponsor":["NSF of China National Natural Science Foundation of China","University of Sciences & Technology, Hefei University of Sciences & Technology, Hefei","Beijing ACM SIGMM Chapter"],"location":"Huangshan China","acronym":"ICIMCS '13"},"container-title":["Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2499788.2499821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2499788.2499821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:33:58Z","timestamp":1750232038000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2499788.2499821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,17]]},"references-count":16,"alternative-id":["10.1145\/2499788.2499821","10.1145\/2499788"],"URL":"https:\/\/doi.org\/10.1145\/2499788.2499821","relation":{},"subject":[],"published":{"date-parts":[[2013,8,17]]},"assertion":[{"value":"2013-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}