{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:18:56Z","timestamp":1729678736603,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/iih-msp.2012.30","type":"proceedings-article","created":{"date-parts":[[2012,8,28]],"date-time":"2012-08-28T20:27:56Z","timestamp":1346185676000},"page":"102-105","source":"Crossref","is-referenced-by-count":9,"title":["An Integer DCT and Affine Transformation Based Image Steganography Method"],"prefix":"10.1109","author":[{"given":"Xianhua","family":"Song","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/93.959097"},{"key":"2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/10719724_5","article-title":"Attacks on steganographic systems","volume":"1768","author":"westfeld","year":"1999","journal-title":"Proc 3rd Int Workshop on Information Hiding"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/S1063-5203(03)00032-0"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1016\/S0031-3203(00)00015-7"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"6","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","article-title":"Steganalysis of JPEG Image: Breaking the F5 Algorithm","volume":"2578","author":"fridrich","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/ICCS.2010.5686485"},{"key":"4","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","article-title":"F5-A Steganography Algorithm","volume":"2137","author":"westfeld","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1049\/iet-ifs.2009.0080"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TIFS.2010.2051426"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/MMSP.2004.1436446"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/83.869177"}],"event":{"name":"2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)","start":{"date-parts":[[2012,7,18]]},"location":"Piraeus-Athens, Greece","end":{"date-parts":[[2012,7,20]]}},"container-title":["2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6273237\/6274114\/06274411.pdf?arnumber=6274411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T05:31:42Z","timestamp":1562131902000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6274411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iih-msp.2012.30","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}