{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T18:53:32Z","timestamp":1702320812460},"reference-count":27,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636201","61572452"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Image Processing"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1049\/iet-ipr.2018.5401","type":"journal-article","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T02:41:35Z","timestamp":1537411295000},"page":"24-33","source":"Crossref","is-referenced-by-count":6,"title":["Controversial \u2018pixel\u2019 prior rule for JPEG adaptive steganography"],"prefix":"10.1049","volume":"13","author":[{"given":"Wenbo","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefeiPeople's Republic of China"}]},{"given":"Weixiang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefeiPeople's Republic of China"}]},{"given":"Kejiang","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefeiPeople's Republic of China"}]},{"given":"Hang","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefeiPeople's Republic of China"}]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefeiPeople's Republic of China"}]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefeiPeople's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2019,1]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"crossref","volume-title":"Steganography in digital media: principles, algorithms and applications","author":"Fridrich J.","year":"2009","DOI":"10.1017\/CBO9781139192903"},{"key":"e_1_2_9_3_1","unstructured":"2008 Proc. Tenth Int. Workshop Information Hiding Sana Barbara CA USA T. Pevn\u00fd J. Fridrich Benchmarking for steganography 251 267"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2013.0109"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2014.0351"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2017.0162"},{"issue":"3","key":"e_1_2_9_7_1","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","article-title":"Minimizing additive distortion in steganography using syndrome trellis codes","volume":"6","author":"Filler T.","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"e_1_2_9_8_1","unstructured":"2010 Proc. 12th Int. Workshop Information Hiding Calgary AB Canada T. Pevn\u00fd T. Filler T. Bas Using high\u2010dimensional image models to perform highly undetectable steganography 161 177"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_2_9_11_1","unstructured":"2012 Proc. IEEE Workshop Information Forensic and Security Costa Adeje \u2013 Tenerife Spain December V. Holub J. Fridrich Designing steganographic distortion using directional filters 234 239"},{"key":"e_1_2_9_12_1","unstructured":"2013 Proc. First ACM Workshop Information Hiding and Multimedia Security Montpellier France V Houlb J. Fridrich Digital image steganography using universal distortion 59 68"},{"key":"e_1_2_9_13_1","unstructured":"2014 Proc. IEEE Int. Conf. Image Processing Paris France B. Li M. Wang J.W. Huang A new cost function for spatial image steganography 4206 4210"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"issue":"5","key":"e_1_2_9_15_1","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","article-title":"Uniform embedding for efficient JPEG steganography","volume":"9","author":"Guo L.J.","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"12","key":"e_1_2_9_16_1","doi-asserted-by":"crossref","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","article-title":"Using statistical image model for JPEG steganography: uniform embedding revisited","volume":"10","author":"Guo L.J.","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"5","key":"e_1_2_9_17_1","doi-asserted-by":"crossref","first-page":"050501","DOI":"10.1117\/1.JEI.25.5.050501","article-title":"Hybrid distortion function for JPEG steganography","volume":"25","author":"Wang Z.C.","year":"2016","journal-title":"J. Electron. Imaging"},{"issue":"5","key":"e_1_2_9_18_1","first-page":"1","article-title":"Distortion function based on residual blocks for JPEG steganography","volume":"25","author":"Wei Q.","year":"2017","journal-title":"Multimedia Tools Appl."},{"issue":"11","key":"e_1_2_9_19_1","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1109\/TIFS.2017.2718480","article-title":"A new rule for cost reassignment in adaptive steganography","volume":"12","author":"Zhou W.B.","year":"2017","journal-title":"IEEE Trans. Inf. Forensic Sec."},{"key":"e_1_2_9_20_1","unstructured":"2016 Proc. 12th Int. Conf. Natural Computation Fuzzy Systems and Knowledge Discovery Changsha China W.B. Zhou W.M. Zhang N.H. Yu Evolving distortion function by exploiting the differences among comparable adaptive steganography 1235 1244"},{"issue":"4","key":"e_1_2_9_21_1","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","article-title":"Gibbs construction in steganography","volume":"5","author":"Filler T.","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"8","key":"e_1_2_9_22_1","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1109\/TIFS.2014.2326954","article-title":"Investigation on cost assignment in spatial image steganography","volume":"9","author":"Li B.","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"e_1_2_9_23_1","unstructured":"2011 Proc. 13th Int. Workshop Information Hiding Prague Czech Republic P. Bas T. Filler T. Pevn\u00fd Break our steganographic system \u2013 the ins and outs of organizing boss 59 70"},{"issue":"2","key":"e_1_2_9_24_1","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","article-title":"Low\u2010complexity features for JPEG steganalysis using undecimated DCT","volume":"10","author":"Holub V.","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"e_1_2_9_25_1","unstructured":"BasP. andFuronT.: \u2018BOWS\u20102 contest (break our watermarking system)\u2019 Organised within the activity of the Watermarking Virtual Laboratory (Wavila) of the European Network of Excellence ECRYPT 2008"},{"key":"e_1_2_9_26_1","unstructured":"2007 Proc. SPIE Electronic Imaging Security Steganography and Watermarking of Multimedia Contents IX San Jose CA USA J. Fridrich T. Filler Practical methods for minimizing embedding impact in steganography 650502"},{"key":"e_1_2_9_27_1","unstructured":"2015 Proc. Third ACM Workshop Inf. Hiding and Multimedia Security Portland OR USA X.F. Song F.L. Liu C.F. Yang Steganalysis of adaptive JPEG steganography using 2D gabor filters 15 23"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2018.5401","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ipr.2018.5401","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2018.5401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T23:48:37Z","timestamp":1610668117000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ipr.2018.5401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1049\/iet-ipr.2018.5401"],"URL":"https:\/\/doi.org\/10.1049\/iet-ipr.2018.5401","archive":["Portico"],"relation":{},"ISSN":["1751-9667","1751-9667"],"issn-type":[{"value":"1751-9667","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}