{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T10:05:49Z","timestamp":1743501949000,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659525","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:11:49Z","timestamp":1552950709000},"page":"1564-1573","source":"Crossref","is-referenced-by-count":2,"title":["Tackling Android Stego Apps in the Wild"],"prefix":"10.23919","author":[{"given":"Wenhao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Li","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Min","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Newman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"JPEG File Interchange Format","year":"2004","author":"hamilton","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"83030a","DOI":"10.1117\/12.907495","article-title":"Steganalysis of jpeg images using rich models","volume":"8303","author":"kodovsk?","year":"2012","journal-title":"Media Watermarking Security and Forensics 2012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref13","first-page":"90280j","article-title":"Study of cover source mismatch in steganalysis and ways to mitigate its impact","author":"kodovsky","year":"2014","journal-title":"Media Watermarking Security and Forensics"},{"key":"ref14","first-page":"35","article-title":"The soot framework for java program analysis: a retrospective","volume":"15","author":"lam","year":"2011","journal-title":"Cetus Users and Compiler Infrastructure Workshop (CETUS 2011)"},{"journal-title":"Steganography","year":"2014","author":"mexnik","key":"ref15"},{"journal-title":"by Vice Media Muslimcrypt","year":"2018","author":"motherboard","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-041715-033554"},{"journal-title":"The Guandian Project Pixelknot","year":"2017","key":"ref19"},{"journal-title":"Cameraw an Android camera app for digital image forensics","year":"2017","author":"chen","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","article-title":"Break Our Steganographic System: The Ins and Outs of Organizing BOSS","author":"bas","year":"2011","journal-title":"Information Hiding"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99277-8_16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379530"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288872"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"journal-title":"UI automator","year":"0","key":"ref1"},{"journal-title":"Smali","year":"0","author":"gruver","key":"ref9"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","article-title":"F5&#x2014;a steganographic algorithm","author":"westfeld","year":"2001","journal-title":"Information Hiding"},{"journal-title":"ApkTool A tool for reverse engineering Android apk files","year":"2017","author":"winiewski","key":"ref21"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2018,11,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659525.pdf?arnumber=8659525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:19:43Z","timestamp":1598221183000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659525","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}