{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:01:43Z","timestamp":1725559303072},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262268"},{"type":"electronic","value":"9783540320838"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11496618_32","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:27:32Z","timestamp":1279052852000},"page":"440-454","source":"Crossref","is-referenced-by-count":1,"title":["On Security Notions for Steganalysis"],"prefix":"10.1007","author":[{"given":"Kisik","family":"Chang","sequence":"first","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Bao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hyungjun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jongin","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-61996-8_30","volume-title":"Information Hiding","author":"R.J. Anderson","year":"1996","unstructured":"Anderson, R.J.: Stretching the Limits of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 39\u201348. Springer, Heidelberg (1996)"},{"key":"32_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Chang, K., Deng, R., Feng, B., Lee, S., Kim, H.: On Security Notions of Steganographic Systems. In: International Workshop on Digital Watermarking 2004 (2004) (accepted)","DOI":"10.1007\/978-3-540-31805-7_12"},{"key":"32_CR4","unstructured":"Goldwasser, G., Bellare, M.: Lecture Notes on Modern Cryptography (August 2001), Available at http:\/\/www-cse.ucsd.edu\/users\/mihir\/papers\/gb.html"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"N.J. Hopper","year":"2002","unstructured":"Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 77\u201392. Springer, Heidelberg (2002)"},{"key":"32_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4375-6","volume-title":"Information Hiding: Steganography and Watermarking Attacks and Contermeasures","author":"N.F. Johnson","year":"2001","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking Attacks and Contermeasures. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"32_CR7","unstructured":"Katzen Beisser, S., Petitcolas, F.A.P.: Information Hiding - techniques for steganography and digital watermarking. Artech House Books (1999)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Defining Security in Steganographic Systems. In: Proceeding of the SPIE. Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 50\u201356 (2002)","DOI":"10.1117\/12.465313"},{"key":"32_CR9","first-page":"51","volume-title":"CRYPTO 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The Prisoners\u2019 Problem and the Subliminal Channe. In: CRYPTO 1983, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-49380-8_24","volume-title":"Information Hiding","author":"J. Z\u00f6llner","year":"1998","unstructured":"Z\u00f6llner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 344\u2013354. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11496618_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:00:19Z","timestamp":1605643219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11496618_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262268","9783540320838"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11496618_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}