{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:06:47Z","timestamp":1725235607508},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102386","U2336206","62002334","62072421","62121002"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Anhui Initiative in Quantum Information Technologies","award":["AHY150400"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tcomm.2023.3342247","type":"journal-article","created":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T19:26:18Z","timestamp":1702495578000},"page":"2138-2151","source":"Crossref","is-referenced-by-count":0,"title":["LDGM Codes-Based Near-Optimal Coding for Adaptive Steganography"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"http:\/\/orcid.org\/0009-0007-5269-6491","authenticated-orcid":false,"given":"Qiyi","family":"Yao","sequence":"first","affiliation":[{"name":"CAS Key Laboratory of Electro-Magnetic Space Information, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5576-6108","authenticated-orcid":false,"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of Electro-Magnetic Space Information, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9868-3414","authenticated-orcid":false,"given":"Kejiang","family":"Chen","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of Electro-Magnetic Space Information, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4417-9316","authenticated-orcid":false,"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of Electro-Magnetic Space Information, University of Science and Technology of China, Hefei, China"}]}],"member":"263","reference":[{"volume-title":"Digital Watermarking and Steganography","year":"2008","author":"Cox","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077629"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"volume-title":"Some Notes Steganography","year":"2023","author":"Crandall","key":"ref5"},{"first-page":"289","article-title":"High capacity despite better steganalysis (F5\u2014A steganographic algorithm)","volume-title":"Proc. Int. Workshop Inf. Hiding.","author":"Westfeld","key":"ref6"},{"first-page":"147","article-title":"Embedding information in grayscale images","volume-title":"Proc. 22nd Symp. Inf. Commun. Theory","author":"Van Dijk","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161405"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04431-1_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855393"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74124-4_21"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2982624"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2439211"},{"volume-title":"Low-Density Parity-Check Codes","year":"1963","author":"Gallager","key":"ref16","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.697471"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1126\/science.1073287"},{"first-page":"1089","article-title":"A new look at survey propagation and its generalizations","volume-title":"Proc. 16th Annu. Symp. Discrete Algorithms (SODA)","author":"Maneva","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/isit.2005.1523592"},{"journal-title":"arXiv:cs\/0602046","article-title":"Analysis of LDGM and compound codes for lossy compression and binning","year":"2006","author":"Martinian","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2039160"},{"first-page":"495","article-title":"Binary quantization using belief propagation over factor graphs of LDGM codes","volume-title":"Proc. 45th Annu. Allerton Conf. Commun., Control, Comput.","author":"Filler","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205707"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2010.5671884"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.965567"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.839541"},{"issue":"1","key":"ref28","first-page":"19","article-title":"Coding for channel with random parameters","volume":"9","author":"Gel\u2019fand","year":"1980","journal-title":"Problems Control Inf. Theory"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/047174882x"},{"article-title":"Using non-binary embedding operation to minimize additive distortion functions in steganography","volume-title":"Proc. 2nd IEEE Int. Workshop Inf. Forensics Secur.","author":"Filler","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1049\/el:20070248"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/18.910579"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/18.910572"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/18.910578"},{"article-title":"Advances in syndrome coding based on stochastic and deterministic matrices for steganography","year":"2011","author":"Winkler","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803253"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.080017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP55476.2022.10039228"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TURBOCODING.2008.4658729"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511791338"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/10504657\/10356151.pdf?arnumber=10356151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T04:01:53Z","timestamp":1725163313000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10356151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":40,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2023.3342247","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"type":"print","value":"0090-6778"},{"type":"electronic","value":"1558-0857"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}