iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/ICIP.2004.1419511
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T04:08:39Z","timestamp":1722917319655},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icip.2004.1419511","type":"proceedings-article","created":{"date-parts":[[2005,4,19]],"date-time":"2005-04-19T15:05:35Z","timestamp":1113923135000},"page":"1165-1168","source":"Crossref","is-referenced-by-count":17,"title":["Steganalysis of quantization index modulation data hiding"],"prefix":"10.1109","volume":"2","author":[{"given":"K.","family":"Sullivan","sequence":"first","affiliation":[]},{"given":"Z.","family":"Bi","sequence":"additional","affiliation":[]},{"given":"U.","family":"Madhow","sequence":"additional","affiliation":[]},{"given":"S.","family":"Chandrosekaran","sequence":"additional","affiliation":[]},{"given":"B.S.","family":"Manjunath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/TSP.2003.809366"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/18.923725"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/TIT.1983.1056659"},{"year":"1999","author":"lyu","journal-title":"5th International Workshop on Information Hiding","article-title":"Detecting hidden messages using higher-order statistics and support vector machines","key":"10"},{"year":"2003","author":"li","journal-title":"Proc ISIS","article-title":"Reliable adaptive watermarking scheme integrated with JPEG2000","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/ICASSP.2003.1199526"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1007\/978-0-387-35413-2_6"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1109\/ICASSP.2002.5745405","article-title":"High-volume data hiding in images: Introducing perceptual criteria into quantization based embedding","author":"solanki","year":"2002","journal-title":"Proceedings of ICASSP"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICIP.2003.1247007"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1117\/12.465294","article-title":"Applied public-key steganography","author":"guillon","year":"2002","journal-title":"Proceedings of SPIE"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1007\/978-1-4757-2341-0"},{"year":"2004","author":"wang","journal-title":"Proceedings of SPIE","article-title":"Steganalysis of block-structured stegotext","key":"12"}],"event":{"name":"2004 International Conference on Image Processing, 2004. ICIP '04.","location":"Singapore"},"container-title":["2004 International Conference on Image Processing, 2004. ICIP '04."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9716\/30677\/01419511.pdf?arnumber=1419511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T14:36:20Z","timestamp":1497623780000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1419511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icip.2004.1419511","relation":{},"subject":[]}}