{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:01:49Z","timestamp":1725483709157},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_4","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"42-50","source":"Crossref","is-referenced-by-count":3,"title":["Information Hiding through Noisy Channels"],"prefix":"10.1007","author":[{"given":"Valeri","family":"Korjik","sequence":"first","affiliation":[]},{"given":"Guillermo","family":"Morales-Luna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C. H. Bennet","year":"1995","unstructured":"Bennet, C. H., Brassard, G., Maurer, U. M.: \u201cGeneralized privacy amplifications\u201d. IEEE Trans. on IT, vol. 41, nr. 6, pp. 1915\u20131923. 1995.","journal-title":"IEEE Trans. on IT"},{"key":"4_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/3-540-61996-8_43","volume-title":"First International Workshop, IH\u201996","author":"J. Brassil","year":"1996","unstructured":"Brassil, J., O\u2019Gorman, L.: \u201cWatermarking document images with Bounding Box Expansion\u201d. First International Workshop, IH\u201996, Lecture Notes in Computer Science, vol. 1174, pp. 227\u2013235. Springer-Verlag. 1996."},{"key":"4_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Second International Workshop, IH\u201998","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: \u201cAn information-theoretic model for steganography\u201d. Second International Workshop, IH\u201998, Lecture Notes in Computer Science, vol. 1525, pp. 306\u2013318. Springer-Verlag. 1998."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Cohen, A., Lapidoth, A.: \u201cOn the Gaussian watermarking game\u201d. Proc. of the 2000 IEEE International Symposium on Information Theory, p. 48. 2000.","DOI":"10.1109\/ISIT.2000.866338"},{"key":"4_CR5","series-title":"Lect Notes Comput Sci","first-page":"356","volume-title":"Second International Workshop, IH\u201998","author":"S. Craver","year":"1998","unstructured":"Craver, S.: \u201cOn public-key steganography in the presence of an active warden\u201d. Second International Workshop, IH\u201998, Lecture Notes in Computer Science, vol. 1525, pp. 356\u2013368. Springer-Verlag. 1998."},{"key":"4_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/3-540-61996-8_48","volume-title":"First International Workshop, IH\u201996","author":"D. Gruhl","year":"1996","unstructured":"Gruhl, D., Lu, A., Bender, W.: \u201cEcho hiding\u201d. First International Workshop, IH\u201996, Lecture Notes in Computer Science, vol. 1174, pp. 295\u2013315. Springer-Verlag. 1996."},{"key":"4_CR7","series-title":"Lect Notes Comput Sci","first-page":"185","volume-title":"Auscrypt\u201992","author":"V. Korjik","year":"1993","unstructured":"Korjik, V., Yakovlev, V.: \u201cNon-asymptotic estimates of information protection efficiency for the wire-trap channel concept\u201d. Auscrypt\u201992, Lecture Notes in Computer Science, vol. 718, pp. 185\u2013195. Springer-Verlag. 1993."},{"key":"4_CR8","unstructured":"Moulin, P., O\u2019Sullivan, J. A.: \u201cInformation-theoretic analysis of information hiding\u201d. Proc. of the IEEE International Symposium on Information Theory, Boston. 1998."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Wyner, A.: \u201cThe wire-tap channel\u201d. Bell Syst. Tech. Journal, 1975, pp. 1355\u20131381.","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"4_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-49380-8_24","volume-title":"Second International Workshop, IH\u201998","author":"J. Z\u00f6llner","year":"1998","unstructured":"Z\u00f6llner, J., Federrath, H., Klimant, A., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: \u201cModeling the security of steganographic systems\u201d. Second International Workshop, IH\u201998, Lecture Notes in Computer Science, vol. 1525, pp. 344\u2013354. Springer-Verlag. 1998."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:40:22Z","timestamp":1556376022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}