{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:02:11Z","timestamp":1725483731358},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540678236"},{"type":"electronic","value":"9783540449294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44929-9_12","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:20:53Z","timestamp":1178356853000},"page":"140-151","source":"Crossref","is-referenced-by-count":0,"title":["Steganography Using Modern Arts"],"prefix":"10.1007","author":[{"given":"Carlo","family":"Blundo","sequence":"first","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,24]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"R. Anderson, R. Needham, and A. Shamir. Steganographyc file system. In Proceedings of 2nd Workshop on Information Hiding, pages 73\u201382, 1998.","DOI":"10.1007\/3-540-49380-8_6"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"R.J. Anderson. Stretching the limits of steganography. In First Workshop on Information Hiding, pages 39\u201348, 1996.","DOI":"10.1007\/3-540-61996-8_30"},{"key":"12_CR3","unstructured":"M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: Analysis of the des modes of operation. In Proceedings of 38th IEEE Symposium on Foudations of Computer Science, 1997."},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"3","author":"W. Bender","year":"1996","unstructured":"W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM System Journal, 3 and 4:313\u2013336, 1996.","journal-title":"IBM System Journal"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In Proceedings of IEEE International Conference on Image Processing, pages 243\u2013246, 1996.","DOI":"10.1109\/ICIP.1996.560429"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"A. Finkelstein and M. Range. Image mosaics. In R.D. Hersch, J. Andr\u00e9, and H. Brown, editors, Proceedings of EP\u201998 and RIDT\u201998 Conferences, pages 11\u201322, 1998.","DOI":"10.1007\/BFb0053259"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28:270\u2013299, 1984.","journal-title":"Journal of Computer and System Sciences"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"C.E. Jacobs, A. Finkelstein, and D.H. Salesin. Fast multiresolution image querying. In Proceedings of SIGGRAPH 95, 1995.","DOI":"10.1145\/218380.218454"},{"key":"12_CR9","unstructured":"A. J. Menenez, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography CRC Press, 1997."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"W. Niblack, R. Barber, and W. Equitz et. al. The qbic project: Querying images by content using color, texture, and shape. In Storage and Retrieval for Image and Video Databases, SPIE, pages 173\u2013187, 1993.","DOI":"10.1117\/12.143648"},{"issue":"9","key":"12_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.410150","volume":"28","author":"M. E. Ogle","year":"1995","unstructured":"M. E. Ogle. Chabot: Retrieval from a relational database of images. Computer, 28(9):40\u201348, 1995.","journal-title":"Computer"},{"issue":"7","key":"12_CR12","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A. Peticolas","year":"1999","unstructured":"F.A. Peticolas, R.J. Anderson, and M.G. Kuhn. Information hiding-a survey. Proceedings of the IEEE, 87(7):1062\u20131078, July 1999.","journal-title":"Proceedings of the IEEE"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann. Information hiding terminology. In Proceedings of 1st Workshop on Information Hiding, pages 347\u2013350, 1996.","DOI":"10.1007\/3-540-61996-8_52"},{"key":"12_CR14","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/ICIP.1996.560422","volume":"3","author":"I. Pitas","year":"1996","unstructured":"I. Pitas. A method for signature casting on digital images. In International Conference on Image Processing, volume 3, pages 215\u2013218, 1996.","journal-title":"International Conference on Image Processing"},{"key":"12_CR15","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1117\/12.274503","volume":"3016","author":"C.I. Podilchuk","year":"1997","unstructured":"C.I. Podilchuk and W. Zeng. Digital image watermarking using visual models. Human Visual and Electronic Imaging II, 3016:100\u2013111, 1997.","journal-title":"Human Visual and Electronic Imaging II"},{"key":"12_CR16","unstructured":"R. Silvers. Photomosaics. http:\/\/www.photomosaic.com ."},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1109\/ICIP.1996.560421","volume":"III","author":"M.D. Swanson","year":"1996","unstructured":"M.D. Swanson, B. Zhu, and A.H. Tewfik. Trasparent robust image watermarking. In Proceedings of IEEE International Conference on Image Processing, volume III, pages 211\u2013214, 1996.","journal-title":"Proceedings of IEEE International Conference on Image Processing"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"R. van Schyndel, A. Tirkel, and C. Osborne. A digital watermarking. In Proceedings of IEEE International Conference on Image Processing, pages 86\u201390, 1994.","DOI":"10.1109\/ICIP.1994.413536"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"R.B. Wolfgang and E.J. Delp. A watermarking for digital images. In Proceedings of IEEE International Conference on Image Processing, pages 219\u2013222, 1996.","DOI":"10.1109\/ICIP.1996.560423"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44929-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:41:03Z","timestamp":1556376063000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44929-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540678236","9783540449294"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-44929-9_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}