{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:06:44Z","timestamp":1761581204962,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,11]],"date-time":"2014-06-11T00:00:00Z","timestamp":1402444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373169, 61272451 and 61272453"],"award-info":[{"award-number":["61373169, 61272451 and 61272453"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,11]]},"DOI":"10.1145\/2600918.2600938","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"83-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Video steganalysis based on subtractive probability of optimal matching feature"],"prefix":"10.1145","author":[{"given":"Yanzhen","family":"Ren","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Liming","family":"Zhai","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Tingting","family":"Zhu","sequence":"additional","affiliation":[{"name":"Naval university of engineering, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2014,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2006.158"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. Int. Symposium on Circuit and Systems (ISCAS)","author":"Fang D.","year":"2006","unstructured":"D. Fang , and L. Chang . Data hiding for digital video with phase of motion vector . Proc. Int. Symposium on Circuit and Systems (ISCAS) ( 2006 ), 1422--1425. D. Fang, and L. Chang. Data hiding for digital video with phase of motion vector. Proc. Int. Symposium on Circuit and Systems (ISCAS) (2006), 1422--1425."},{"key":"e_1_3_2_1_3_1","unstructured":"FFmpeg. FFmpeg 264 decoder. http:\/\/ffmpeg.org\/. @Online.  FFmpeg. FFmpeg 264 decoder. http:\/\/ffmpeg.org\/. @Online."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2090520"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28490-8_10"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1170746.1171741"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"e_1_3_2_1_9_1","unstructured":"Stego M. MSU :: MSU Graphics Media Lab. http:\/\/compression.ru\/video\/stego-video\/index-en.html. @Online.  Stego M. MSU :: MSU Graphics Media Lab. http:\/\/compression.ru\/video\/stego-video\/index-en.html. @Online."},{"key":"e_1_3_2_1_10_1","unstructured":"Suehring K. H.264\/AVC JM Reference Software Download. http:\/\/iphome.hhi.de\/suehring\/tml\/download\/. @Online.  Suehring K. H.264\/AVC JM Reference Software Download. http:\/\/iphome.hhi.de\/suehring\/tml\/download\/. @Online."},{"key":"e_1_3_2_1_11_1","unstructured":"TNT. Tnt.uni Video Test Media. ftp:\/\/ftp.tnt.uni-hannover.de\/pub\/svc\/testsequences\/. @Online.  TNT. Tnt.uni Video Test Media. ftp:\/\/ftp.tnt.uni-hannover.de\/pub\/svc\/testsequences\/. @Online."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815165"},{"key":"e_1_3_2_1_13_1","unstructured":"VideoLAN. VideoLAN x264 the best H.264\/AVC encoder. http:\/\/www.videolan.org\/developers\/x264.html. @Online.  VideoLAN. VideoLAN x264 the best H.264\/AVC encoder. http:\/\/www.videolan.org\/developers\/x264.html. @Online."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918122"},{"key":"e_1_3_2_1_15_1","unstructured":"Xiph. Xiph.org :: Derf's Test Media Collection. http:\/\/media.xiph.org\/video\/derf\/. @Online.  Xiph. Xiph.org :: Derf's Test Media Collection. http:\/\/media.xiph.org\/video\/derf\/. @Online."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2042445.2042463"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2176116"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1364\/AO.51.004667"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.02.012"}],"event":{"name":"IH&MMSec '14: ACM Information Hiding and Multimedia Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Salzburg Austria","acronym":"IH&MMSec '14"},"container-title":["Proceedings of the 2nd ACM workshop on Information hiding and multimedia security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600938","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600918.2600938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:39Z","timestamp":1750278159000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,11]]},"references-count":18,"alternative-id":["10.1145\/2600918.2600938","10.1145\/2600918"],"URL":"https:\/\/doi.org\/10.1145\/2600918.2600938","relation":{},"subject":[],"published":{"date-parts":[[2014,6,11]]},"assertion":[{"value":"2014-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}