{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T18:24:25Z","timestamp":1743445465364,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002628"},{"type":"electronic","value":"9783540362289"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36228-2_54","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T03:31:35Z","timestamp":1188358295000},"page":"434-441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter"],"prefix":"10.1007","author":[{"given":"Xiangwei","family":"Kong","sequence":"first","affiliation":[]},{"given":"Ting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xingang","family":"You","sequence":"additional","affiliation":[]},{"given":"Deli","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,16]]},"reference":[{"key":"54_CR1","first-page":"208","volume":"6","author":"X. You","year":"2000","unstructured":"Xingang You, Yunbiao Guo, Linna Zhou: Affections to Image Data Properties in Spatial Domain from Information Hiding, Proceedings of CIHW2000, Beijing, China, 6 (2000) 208\u2013215","journal-title":"Proceedings of CIHW2000"},{"unstructured":"R. Chandramouli, Nasir D. Memon: A Distributed Detection Framework for Steganalysis, Proceedings on ACM multimedia Workshops, Los Angeles 10-11 (2000) 123\u2013126","key":"54_CR2"},{"unstructured":"Jiri Fridrich, R. Du, M. Long: Steganalysis of LSB Encoding in Color Image, Proceeding of IEEE International Conf. on Multimedia and Expo, Piscataway, (2000)","key":"54_CR3"},{"key":"54_CR4","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"10","author":"J. Fridrich","year":"2001","unstructured":"Jiri Fridrich, R. Du, M. Goljan, Detecting LSB Steganography in Color and Grey-Scale Images, Magazine of IEEE Multimedia Special Issue on Security,10 (2001) 22\u201328","journal-title":"Magazine of IEEE Multimedia Special Issue on Security"},{"key":"54_CR5","first-page":"20","volume":"8","author":"J. Fridrich","year":"2001","unstructured":"Jiri Fridrich, R. Du, M. Goljan: Steganalysis Based on JPEG Compatibility, Special Session on Theoretical Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications, Denver 8 (2001) 20\u201324","journal-title":"Special Session on Theoretical Practical Issues in Digital Watermarking and Data Hiding"},{"doi-asserted-by":"crossref","unstructured":"A. Westfeld, A. Pfitzmann: Attacks on Steganographic Systems,In Proceedings of Information Hidding, Third International Workshop, Dresden, Germany (1999)","key":"54_CR6","DOI":"10.1007\/10719724_5"},{"key":"54_CR7","first-page":"113","volume":"9","author":"N. F. Johnson","year":"1998","unstructured":"Neil F. Johnson, Sushil Jajodia, Steganalysis: The Investigation of Hidden Information, Proceedings of the IEEE Information Technology Conference, Syracuse, New York, USA 9 (1998) 113\u2013116","journal-title":"Proceedings of the IEEE Information Technology Conference, Syracuse"},{"doi-asserted-by":"crossref","unstructured":"Donovan Artz, Digital Steganography: Hiding Data within Data, IEEE Internet Computing, 5-6 (2001) 75\u201380","key":"54_CR8","DOI":"10.1109\/4236.935180"},{"key":"54_CR9","first-page":"205","volume":"6","author":"L. Mao","year":"2000","unstructured":"Lindai Mao, \u201cAnalysis of image entropy\u201d, Proceedings of CIHW2000, Beijing, China, 6 (2000) 205\u2013208","journal-title":"Proceedings of CIHW2000"},{"unstructured":"Yujin Zhang: Image Engineering \u2014 image processing and analyzing, Tsinghua University Press, Beijing 10 (1999)","key":"54_CR10"},{"unstructured":"Eiji Kawaguchi, Richard O. Eason: Principle and applications of BPCS-Steganography, The SPIE Conf. On Multimedia Systems and Applications, Boston, Vol.3528, (1998) 464\u2013473","key":"54_CR11"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing \u2014 PCM 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36228-2_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T05:10:10Z","timestamp":1610082610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36228-2_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002628","9783540362289"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36228-2_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"16 December 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}