{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T11:23:16Z","timestamp":1779103396499,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T00:00:00Z","timestamp":1700265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62102450, 62272478,62202496"],"award-info":[{"award-number":["62102450, 62272478,62202496"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,18]]},"DOI":"10.1145\/3603273.3635245","type":"proceedings-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T18:12:40Z","timestamp":1704823960000},"page":"385-391","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Motion Vector Domain Video Steganography Maintaining the Statistical Characteristics of Skipped Macroblocks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4002-4619","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"first","affiliation":[{"name":"College of Cryptography Engineering, Engineering University of the Chinese People's Armed Police Force, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8783-3608","authenticated-orcid":false,"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Cryptography Engineering, Engineering University of the Chinese People's Armed Police Force, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1877-9702","authenticated-orcid":false,"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Cryptography Engineering, Engineering University of the Chinese People's Armed Police Force, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2946812"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2090520"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879281"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2006.1692862"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Cao Y. Zhao X. Feng D. and Sheng R. 2011. Video steganography with perturbed motion estimation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6958 LNCS (2011) 193\u2013207. DOI:https:\/\/doi.org\/10.1007\/978-3-642-24178-9_14.","DOI":"10.1007\/978-3-642-24178-9_14"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2223-8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756609"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2387160"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2743-x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08617-y"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103439"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3135384"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.02.012"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2567073"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2176116"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083237"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2308633"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623587"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Zhai L. Wang L. Ren Y. and Liu Y. 2021. Generalized Local Optimality for Video Steganalysis in Motion Vector Domain. arixv. (2021) 1\u201313. DOI:https:\/\/doi.org\/10.48550\/arXiv.2112.11729.","DOI":"10.48550\/arXiv.2112.11729"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Zhai L. Wang L. and Ren Y. 2020. Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors. IEEE Transactions on Information Forensics and Security. 15 c (2020) 1762\u20131777. DOI:https:\/\/doi.org\/10.1109\/TIFS.2019.2949428.","DOI":"10.1109\/TIFS.2019.2949428"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC50466.2020.00030"},{"key":"e_1_3_2_1_23_1","unstructured":"Li J. Zhang M. Niu K. Zhang Y. and Yang X. 2023. Motion Vector-Domain Video Steganalysis Exploiting Skipped Macroblocks. (Oct. 2023). DOI:http:\/\/arxiv.org\/abs\/2310.07121."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815165"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3101953"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3101953"},{"key":"e_1_3_2_1_27_1","volume-title":"2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763)","author":"Jeyun Lee","unstructured":"Jeyun Lee and Byeungwoo Jeon Fast mode decision for H.264. 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763) 1131\u20131134."},{"key":"e_1_3_2_1_28_1","unstructured":"YUV Video Sequences http:\/\/trace.eas.asu.edu\/yuv\/index.html"},{"key":"e_1_3_2_1_29_1","unstructured":"VideoLAN-x264 The Best H.264\/AVC Encoder: http:\/\/www.videolan.org\/developers\/x264.html."}],"event":{"name":"AAIA 2023: 2023 International Conference on Advances in Artificial Intelligence and Applications","location":"Wuhan China","acronym":"AAIA 2023"},"container-title":["Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3635245","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603273.3635245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:35:08Z","timestamp":1755891308000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3635245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,18]]},"references-count":29,"alternative-id":["10.1145\/3603273.3635245","10.1145\/3603273"],"URL":"https:\/\/doi.org\/10.1145\/3603273.3635245","relation":{},"subject":[],"published":{"date-parts":[[2023,11,18]]},"assertion":[{"value":"2024-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}