{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:28Z","timestamp":1725490528191},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_3","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"30-43","source":"Crossref","is-referenced-by-count":2,"title":["A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection"],"prefix":"10.1007","author":[{"given":"Ren\u00e9","family":"Rosenbaum","sequence":"first","affiliation":[]},{"given":"Heidrun","family":"Schumann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"A.J. Anderson","year":"1998","unstructured":"A.J. Anderson and F.A.P. Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communication, (16(4)):474\u2013481, 1998.","journal-title":"IEEE Journal of Selected Areas in Communication"},{"key":"3_CR2","unstructured":"A. Brown. S-tools for windows, version 4. ftp:\/\/idea.sec.dsi.unimi.it\/pub\/security\/crypt\/code\/s-tools4.zip , 1997."},{"key":"3_CR3","series-title":"Lect Notes Comput Sci","volume-title":"A secure robust watermark for multimedia","author":"I. Cox","year":"1996","unstructured":"I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure robust watermark for multimedia. In Lecture Notes in Computer Science, number vol1174. SpringerVerlag, 1996."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"B. Fortner and T.E. Meyer. Number by Colors. Springer Verlag, 1997.","DOI":"10.1007\/978-1-4612-1892-0"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"N.F. Johnson and S. Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer, 1998.","DOI":"10.1109\/MC.1998.4655281"},{"key":"3_CR6","unstructured":"R. Machado. EzStego. http:\/\/www.stego.com 1997."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"H.A. Mallot. Sehen und die Verarbeitung visueller Informationen. Vieweg, 1998.","DOI":"10.1007\/978-3-663-12360-6"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"F. A. P. Petitcolas, R. J. Anderson, and M. Kuhn. Information hiding-a survey. In IEEE special issue on protection of multimedia content, 1999.","DOI":"10.1109\/5.771065"},{"key":"3_CR9","unstructured":"C. Polynton. Color science for Film, Video and CGI. Siggraph\u201999, 1999."},{"key":"3_CR10","unstructured":"H. Repp. Hide4pgp. http:\/\/www.heinz-repp.onlinehome.de\/Hide4PGP.htm , 2000."},{"key":"3_CR11","unstructured":"R. Rosenbaum. Computer based steganography in digital images. Master\u2019s thesis, University of Rostock, 2000. In German."},{"key":"3_CR12","unstructured":"K. Sayood. Introduction to Data Compression. Morgan Kaufmann Publishers, 1996."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"G.J. Simmons. The prisoners\u2019 problem and the subliminal channel. InAdvances in Cryptography: Proceedings of CRYPTO, 1983.","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"M.D. Swanson, B. Zhu, and Tewfik A.H. Robust data hiding for images. In Digital Image Processing Workshop, number DSP96. IEEE, 1996.","DOI":"10.1109\/DSPWS.1996.555454"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"M.D. Swanson, B. Zhu, and A.H. Tewfik. Transparent robust image watermarking. In Int. Conf. on Image Processing. IEEE, 1996.","DOI":"10.1109\/ICIP.1996.560421"},{"key":"3_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Attacks on steganographic systems","author":"A. Westerfeld","year":"1999","unstructured":"A. Westerfeld and A. Pfitzmann. Attacks on steganographic systems. In Lecture Notes in Computer Science, volume vol1768. Springer Verlag, 1999."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T17:05:28Z","timestamp":1556816728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}