{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:58:01Z","timestamp":1729659481250,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/icassp.2008.4517962","type":"proceedings-article","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T10:49:25Z","timestamp":1210848565000},"page":"1725-1728","source":"Crossref","is-referenced-by-count":2,"title":["Detection of watermarking methods using Steganalysis"],"prefix":"10.1109","author":[{"given":"Gokhan","family":"Gul","sequence":"first","affiliation":[]},{"given":"Fatih","family":"Kurugollu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Methods of Multivariate Data Analysis","year":"1995","author":"rencher","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/34.824819"},{"journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","author":"katzenbeisser","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(94)90127-9"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.884010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/35.940053"},{"journal-title":"Digital Watermarking Principles and Practice","year":"2001","author":"cox","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44456-4_4"},{"journal-title":"Digital Image Watermarking in the Wavelet Transform Domain","year":"2001","author":"meerwald","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1117\/12.703920"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839896"},{"key":"4","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/3-540-36415-3_22","article-title":"detecting hidden messages using higher-order statistics and support vector machines","volume":"2578","author":"lyu","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"9","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1117\/12.263442","article-title":"digital signature of color images using amplitude modulation","volume":"2952","author":"kutter","year":"1997","journal-title":"Proc SPIE Storage and Retrieval for Image and Video Databases"},{"key":"8","first-page":"456","article-title":"spatial method for copyright labeling of digital images","author":"bruyndonckx","year":"1995","journal-title":"IEEE Workshop on Nonlinear Signal and Image Processing"}],"event":{"name":"ICASSP 2008. IEEE International Conference on Acoustic, Speech and Signal Processes","start":{"date-parts":[[2008,3,31]]},"location":"Las Vegas, NV","end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE International Conference on Acoustics, Speech and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4505270\/4517521\/04517962.pdf?arnumber=4517962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T07:56:32Z","timestamp":1557561392000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4517962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icassp.2008.4517962","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}