{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:43:17Z","timestamp":1773150197886,"version":"3.50.1"},"reference-count":2,"publisher":"Springer Science and Business Media LLC","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP Journal on Information Security"],"published-print":{"date-parts":[[2009]]},"DOI":"10.1155\/2009\/382310","type":"journal-article","created":{"date-parts":[[2009,4,12]],"date-time":"2009-04-12T14:42:57Z","timestamp":1239547377000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Peak-Shaped-Based Steganographic Technique for JPEG Images"],"prefix":"10.1186","volume":"2009","author":[{"given":"Lorenzo","family":"Rossi","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Garzia","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Cusani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/214762.214771"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","deposited":{"date-parts":[[2011,3,2]],"date-time":"2011-03-02T09:15:06Z","timestamp":1299057306000},"score":1,"resource":{"primary":{"URL":"http:\/\/jis.eurasipjournals.com\/content\/2009\/1\/382310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":2,"alternative-id":["382310","382310"],"URL":"https:\/\/doi.org\/10.1155\/2009\/382310","relation":{},"ISSN":["1687-4161","1687-417X"],"issn-type":[{"value":"1687-4161","type":"print"},{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}