{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:32Z","timestamp":1750220912300,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Technology R&D Program","award":["2016QY15Z2500,2016YFB0801003"],"award-info":[{"award-number":["2016QY15Z2500,2016YFB0801003"]}]},{"name":"Project of Beijing Municipal Science & Technology Commission","award":["Z181100002718001"],"award-info":[{"award-number":["Z181100002718001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802393,U1636102,U1736214,61872356"],"award-info":[{"award-number":["61802393,U1636102,U1736214,61872356"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3335203.3335711","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"25-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Adaptive VP8 Steganography Based on Deblocking Filtering"],"prefix":"10.1145","author":[{"given":"Pei","family":"Xie","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weike","family":"You","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianchang","family":"Yu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi","family":"Ma","sequence":"additional","affiliation":[{"name":"Beijing Information Technology Institute, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6012227"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206014"},{"key":"e_1_3_2_1_3_1","volume-title":"Media Watermarking, Security, and Forensics","author":"Cao Yun","year":"2013","unstructured":"Yun Cao , Xianfeng Zhao , Fenghua Li , and Nenghai Yu. 2013. Video steganography with multi-path motion estimation . In Media Watermarking, Security, and Forensics 2013 , Vol. 8665 . International Society for Optics and Photonics , 86650K. Yun Cao, Xianfeng Zhao, Fenghua Li, and Nenghai Yu. 2013. Video steganography with multi-path motion estimation. In Media Watermarking, Security, and Forensics 2013, Vol. 8665. International Society for Optics and Photonics, 86650K."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.04.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.10.007"},{"key":"e_1_3_2_1_6_1","volume-title":"Media Forensics and Security II","volume":"7541","author":"Filler Tom\u00e1vs","year":"2010","unstructured":"Tom\u00e1vs Filler , Jan Judas , and Jessica Fridrich . 2010 . Minimizing embedding impact in steganography using trellis-coded quantization . In Media Forensics and Security II , Vol. 7541 . International Society for Optics and Photonics, 754105. Tom\u00e1vs Filler, Jan Judas, and Jessica Fridrich. 2010. Minimizing embedding impact in steganography using trellis-coded quantization. In Media Forensics and Security II, Vol. 7541. International Society for Optics and Photonics, 754105."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4284879"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2394970.2395042"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9372-5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.10.922"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2010.2070950"},{"key":"e_1_3_2_1_12_1","volume-title":"LSB matching revisited","author":"Mielikainen Jarno","year":"2006","unstructured":"Jarno Mielikainen . 2006. LSB matching revisited . IEEE signal processing letters, Vol. 13 , 5 ( 2006 ), 285--287. Jarno Mielikainen. 2006. LSB matching revisited. IEEE signal processing letters, Vol. 13, 5 (2006), 285--287."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2177087"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2221191"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083245"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.323282"},{"key":"e_1_3_2_1_17_1","first-page":"256","article-title":"A data hiding method using Mquant in MPEG domain","volume":"37","author":"Wong KokSheik","year":"2008","unstructured":"KokSheik Wong and Kiyoshi Tanaka . 2008 . A data hiding method using Mquant in MPEG domain . The Journal of the Institute of Image Electronics Engineers of Japan , Vol. 37 , 3 (2008), 256 -- 267 . KokSheik Wong and Kiyoshi Tanaka. 2008. A data hiding method using Mquant in MPEG domain. The Journal of the Institute of Image Electronics Engineers of Japan, Vol. 37, 3 (2008), 256--267.","journal-title":"The Journal of the Institute of Image Electronics Engineers of Japan"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2006.158"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-010-0175-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2743-x"}],"event":{"name":"IH&MMSec '19: ACM Information Hiding and Multimedia Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Paris France","acronym":"IH&MMSec '19"},"container-title":["Proceedings of the ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335203.3335711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3335203.3335711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:01Z","timestamp":1750203901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335203.3335711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":20,"alternative-id":["10.1145\/3335203.3335711","10.1145\/3335203"],"URL":"https:\/\/doi.org\/10.1145\/3335203.3335711","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}