{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:11:54Z","timestamp":1725552714393},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308195"},{"type":"electronic","value":"9783540315988"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596981_87","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T14:42:27Z","timestamp":1150555347000},"page":"589-596","source":"Crossref","is-referenced-by-count":6,"title":["Alternatives for Multimedia Messaging System Steganography"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Papapanagiotou","sequence":"first","affiliation":[]},{"given":"Emmanouel","family":"Kellinis","sequence":"additional","affiliation":[]},{"given":"Giannis F.","family":"Marias","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Georgiadis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"87_CR1","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Image Steganography: Concepts and Practice. National University of Singapor (2004)"},{"key":"87_CR2","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Digital image steganography using stochastic modulation. In: SPIE Symposium on Electronic Imaging, San Jose, CA (2003)","DOI":"10.1117\/12.479739"},{"key":"87_CR3","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"87_CR4","unstructured":"Curran, K., Bailey, K.: An evaluation of image-based steganography methods. International Journal of Digital Evidence (2003)"},{"key":"87_CR5","unstructured":"Open Mobile Alliance: Multimedia Messaging Service Architecture Overview Approved Version 1.2, OMA (March 2005)"},{"key":"87_CR6","unstructured":"Open Mobile Alliance: MMS Conformance Document 1.2 Approved Version 1.2, OMA (March 2005)"},{"key":"87_CR7","unstructured":"3rd Generation Partnership Project, Multimedia Messaging Service (MMS): Media formats and codecs (Release 6), 3GPP (March 2005)"},{"key":"87_CR8","unstructured":"3rd Generation Partnership Project, Multimedia Messaging Service (MMS): Functional description; Stage 2 (Release 1999), 3GPP (June 2002)"},{"key":"87_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, p. 289. Springer, Heidelberg (2001)"},{"key":"87_CR10","doi-asserted-by":"crossref","unstructured":"Alturki, F., Mersereau, R.: Secure blind image steganographic technique using discrete fourier transformation. In: IEEE Intl. Conference on Image Processing, Greece (2001)","DOI":"10.1109\/ICIP.2001.958548"},{"key":"87_CR11","unstructured":"Lin, E.T., Delp, E.J.: A Review of Data Hiding in Digital Images. In: Proc. of the Image Processing, Image Quality, Image Capture Systems Conference, Savannah (1999)"},{"key":"87_CR12","unstructured":"Steganos Software, http:\/\/www.demcom.com\/english\/steganos\/index.htm"},{"key":"87_CR13","unstructured":"Cvejic, N., Sepp\u00e4nen, T.: A wavelet domain LSB insertion algorithm for high capacity audio steganography. In: Proc.10th IEEE Digital Signal Processing Workshop, USA (2002)"},{"key":"87_CR14","unstructured":"Bond Wireless, SMS AV Software, http:\/\/www.bondwireless.com\/bwproducts\/bwsmssecure.asp"},{"key":"87_CR15","unstructured":"Moerland, T.: Steganography and Steganalysis, Universiteit Leiden, Rhone-Alpes (2003)"},{"key":"87_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/3-540-61996-8_48","volume-title":"Information Hiding","author":"D. Gruhl","year":"1996","unstructured":"Gruhl, D., Lu, A., Bender, W.: Echo Hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 295\u2013315. Springer, Heidelberg (1996)"},{"issue":"4","key":"87_CR17","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications\u00a016(4), 474\u2013481 (1998), Special Issue on Copyright & Privacy Protection","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"87_CR18","doi-asserted-by":"crossref","unstructured":"Chae, J.J., Manjunath, B.S.: Data hiding in Video. In: Proc. 6th IEEE International Conference on Image Processing (ICIP 1999), Kobe, Japan (1999)","DOI":"10.1109\/ICIP.1999.821620"},{"issue":"12","key":"87_CR19","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: A secure robust watermark for Multimedia. IEEE Trans. Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Processing"},{"issue":"12","key":"87_CR20","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. on Image Processing"},{"key":"87_CR21","unstructured":"Petitcolas, F.A.P.: MP3Stego (August 1998), http:\/\/www.petitcolas.net\/fabien\/steganography\/mp3stego"},{"key":"87_CR22","doi-asserted-by":"crossref","unstructured":"Tachibana, R.: Two-Dimensional Audio Watermark for MPEG AAC Audio. In: Proc. Security, Steganography and Watermarking of Multimedia Contents VI, SPIE USA (2004)","DOI":"10.1117\/12.526243"},{"key":"87_CR23","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, T.H., Memon, N.: Benchmarking steganographic and steganalysis techniques. In: EI SPIE San Jose, CA, January 16-20 (2005)","DOI":"10.1117\/12.587375"},{"key":"87_CR24","unstructured":"Inoue, S., et al.: A Proposal on Information Hiding Methods using XML. In: 1st NLP and XML Workshop, Japan (2001)"},{"key":"87_CR25","unstructured":"Morkel, T., Olivier, M.S., Eloff, J.H.P., Venter, H.S.: One-time Passwords in a Mobile Environment Using Steganography. In: Proc. of IEEE SecPerU 2005, Greece (2005)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596981_87.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:57:42Z","timestamp":1619506662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596981_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308195","9783540315988"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11596981_87","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}