{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:36:35Z","timestamp":1770741395665,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540653868","type":"print"},{"value":"9783540493808","type":"electronic"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49380-8_19","type":"book-chapter","created":{"date-parts":[[2007,8,3]],"date-time":"2007-08-03T14:38:00Z","timestamp":1186151880000},"page":"273-289","source":"Crossref","is-referenced-by-count":152,"title":["Steganalysis of Images Created Using Current Steganography Software"],"prefix":"10.1007","author":[{"given":"Neil F.","family":"Johnson","sequence":"first","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,11,30]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R., (ed.): Information hiding: first international workshop, Cambridge, UK. Lecture Notes in Computer Science, Vol. 1174. Springer-Verlag, Berlin Heidelberg New York (1996)","DOI":"10.1007\/3-540-61996-8"},{"issue":"4","key":"19_CR2","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Petitcolas, F.: On the Limits of Steganography, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May (1998) 474\u2013481.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"19_CR3","volume-title":"Technical Report","author":"T. Aura","year":"1995","unstructured":"Aura, T.: Invisible Communication, EET 1995. Technical Report, Helsinki Univ. of Technology, Finland, November 1995, http:\/\/www.deadlock.hut.fi\/ste\/stefihtml (1995)"},{"issue":"3","key":"19_CR4","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal Vol. 35, No. 3&4. MIT Media Lab (1996) 313\u2013336.","journal-title":"IBM Systems Journal"},{"key":"19_CR5","volume-title":"Graphics File Formats: Reference and Guide","author":"W. Brown","year":"1995","unstructured":"Brown, W., Shepherd, B.J.: Graphics File Formats: Reference and Guide. Manning Publications, Greenwich, CT (1995)"},{"key":"19_CR6","unstructured":"Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. Technical Report 95-10, NEC Research Institute (1995)"},{"key":"19_CR7","first-page":"185","volume-title":"Lecture Notes in Computer Science","author":"I. Cox","year":"1996","unstructured":"Cox, I., Kilian, J., Shamoon, T., Leighton, T.: A Secure, Robust Watermark for Multimedia. In: [1] (1996) 185\u2013206"},{"key":"19_CR8","unstructured":"Cole, E.: Steganography. Information System Security paper, George Mason University. (1997)"},{"key":"19_CR9","unstructured":"Craver, S., Memon, N., Yeo, B., Yeung, N.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques. Research Report RC 20755 (91985), Computer Science\/ Mathematics, IBM Research Division (1997)"},{"key":"19_CR10","unstructured":"Cha, S.D., Park, G.H., Lee, H.K.: A Solution to the Image Downgrading Problem. ACSAC (1995) 108\u2013112"},{"key":"19_CR11","unstructured":"Dunigan, T.: Work in progress on Internet steganography which involves hiding, recovering, and detecting info hidden in the TCP\/IP packet headers. Oak Ridge National Laboratory, Oak Ridge, TN."},{"key":"19_CR12","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"1992","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Addison-Wesley. Reading, MA, (1992)"},{"issue":"3","key":"19_CR13","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1145\/965145.801294","volume":"16","author":"P. Heckbert","year":"1982","unstructured":"Heckbert, P.: Color Image Quantization for Frame Buffer Display. ACM Computer Graphics, vol. 16, no. 3. July (1982) 297\u2013307.","journal-title":"ACM Computer Graphics"},{"key":"19_CR14","unstructured":"Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. IEEE Computer. February (1998) 26\u201334"},{"key":"19_CR15","unstructured":"Johnson, N.F.: Steganography. Information System Security paper, George Mason University (1995) http:\/\/www.isse.gmu.edu\/~njohnson\/stegdoc\/"},{"key":"19_CR16","unstructured":"Koch, E., Rindfrey, J., Zhao, J.: Copyright Protection for Multimedia Data. Proceedings of the International Conference on Digital Media and Electronic Publishing, December 1994. Leeds, UK (1994)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Kurak, C., McHugh, J.: A Cautionary Note On Image Downgrading. IEEE Eighth Annual Computer Security Applications Conference (1992) 153\u2013159.","DOI":"10.1109\/CSAC.1992.228224"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Petitcolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. Second Workshop on Information Hiding, Portland, Oregon, April. This proceedings (1998)","DOI":"10.1007\/3-540-49380-8_16"},{"key":"19_CR19","first-page":"347","volume-title":"Lecture Notes in Computer Science","author":"B. Pfitzman","year":"1996","unstructured":"Pfitzman, B.: Information Hiding Terminology. In: [1] 347\u2013350"},{"key":"19_CR20","unstructured":"Wayner, P.: Disappearing Cryptography. AP Professional, Chestnut Hill, MA (1996)"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Xia, X, Boncelet, C.G., Arce, G.R.: A Multiresolution Watermark for Digital Images. IEEE International Conference on Image Processing, October 1997 (1997)","DOI":"10.1109\/ICIP.1997.647971"},{"key":"19_CR22","unstructured":"Anonymous, Author alias: Black Wolf.: StegoDos-Black Wolf\u2019s Picture Encoder v0.90B, Public Domain. ftp:\/\/ftp.csua.berkeley.edu\/pub\/cypherpunks\/steganography\/stegodos.zip. ."},{"key":"19_CR23","unstructured":"Arachelian, R.: White Noise Storm\u2133 (WNS), Shareware (1994) ftp:\/\/ftp.csua.berkeley.edu\/pub\/cypherpunks\/steganography\/wns210.zip ."},{"key":"19_CR24","unstructured":"Brown, A.: S-Tools for Windows, Shareware 1994. ftp:\/\/ftp.idea.sec.dsi.unimi.it\/pub\/security\/crypt\/code\/s-tools3.zip (version 3), ftp:\/\/idea.sec.dsi.unimi.it\/pub\/security\/crypt\/code\/s-tools4.zip (version 4)"},{"key":"19_CR25","unstructured":"Hastur, H: Mandelsteg, ftp:\/\/ftp.idea.sec.dsi.unimi.it\/pub\/security\/crypt\/code\/"},{"key":"19_CR26","unstructured":"Machado, R.: EzStego, Stego Online, Stego, http:\/\/www.stego.com"},{"key":"19_CR27","unstructured":"Maroney, C.: Hide and Seek, Shareware. ftp:\/\/ftp.csua.berkeley.edu\/pub\/cypherpunks\/steganography\/hdsk41b.zip (version 4.1), http:\/\/www.rugeley.demon.co.uk\/security\/hdsk50.zip (version 5.0), http:\/\/www.cypher.net\/products\/ (version 1.0 for Windows 95)"},{"key":"19_CR28","unstructured":"Repp, H.: Hide4PGP, http:\/\/www.rugeley.demon.co.uk\/security\/hide4pgp.zip"},{"key":"19_CR29","unstructured":"Hansmann F.: Steganos. Deus Ex Machina Communications. http:\/\/www.steganography.com"},{"key":"19_CR30","unstructured":"Digimarc Corporation: PictureMarc\u2133, MarcSpider\u2133, http:\/\/www.digimarc.com"},{"key":"19_CR31","unstructured":"Kutter, M., Jordan, F.: JK-PGS (Pretty Good Signature). Signal Processing Laboratory at Swiss Federal Institute of Technology (EPFL). http:\/\/www.epfl.ch\/~kutter\/watermarking\/JK_PGS.html"},{"key":"19_CR32","unstructured":"MediaSec Technologies LLC.: SysCop\u2133, http:\/\/www.mediasec.com\/"},{"key":"19_CR33","unstructured":"Signum Technologies, SureSign, http:\/\/www.signumtech.com"},{"key":"19_CR34","unstructured":"Upham, D.: Jpeg-Jsteg. Modification of the Independent JPEG Group\u2019s JPEG software (release 4) for 1-bit steganography in JFIF output files. ftp:\/\/ftp.funet.fi\/pub\/crypt\/ steganography."},{"key":"19_CR35","unstructured":"Kuhn, M., Petitcolas F.: StirMark. http:\/\/www.cl.cam.ac.uk\/~fapp2\/watermarking\/stirmark\/ (1997)"},{"key":"19_CR36","unstructured":"Sanders, D.: Stegodetect. Steganography detection tool (1997)"},{"key":"19_CR37","unstructured":"Anonymous: unZign. Watermarking testing tool available at http:\/\/www.altern.org\/watermark\/ - the author may be contacted through unzign@hotmail.com (1997)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49380-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T13:45:43Z","timestamp":1683985543000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49380-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540653868","9783540493808"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/3-540-49380-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}