{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:41:29Z","timestamp":1761864089541},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030435745"},{"type":"electronic","value":"9783030435752"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43575-2_22","type":"book-chapter","created":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T20:06:19Z","timestamp":1585080379000},"page":"256-267","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Broadcasting Steganography in the Blockchain"],"prefix":"10.1007","author":[{"given":"Mengtian","family":"Xu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hanzhou","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guorui","family":"Feng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Feng","family":"Ding","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,3,25]]},"reference":[{"key":"22_CR1","volume-title":"Digital Watermarking and Steganography","author":"I Cox","year":"2008","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008)"},{"issue":"3","key":"22_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2566590.2566610","volume":"57","author":"W Mazurczyk","year":"2014","unstructured":"Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86\u201395 (2014)","journal-title":"Commun. ACM"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, W., Dong, J., Wang, H.: New graph-theoretic approach to social steganography. In: Proceedings of the IS&T Electronic Imaging, Media Watermarking, Security and Forensics, pp. 539-1\u2013539-7(7) (2019)","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-539"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154\u2013167. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24624-4_12"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-74124-4_21","volume-title":"Information Hiding","author":"Y Kim","year":"2007","unstructured":"Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314\u2013327. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-74124-4_21"},{"key":"22_CR6","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). \nhttps:\/\/bitcoin.org\/bitcoin.pdf"},{"issue":"1","key":"22_CR7","first-page":"118","volume":"95","author":"M Iansiti","year":"2017","unstructured":"Iansiti, M., Lakhani, K.R.: The truth about blockchain. Harv. Bus. Rev. 95(1), 118\u2013127 (2017)","journal-title":"Harv. Bus. Rev."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3) (2018). 18 pages","DOI":"10.3390\/cryptography2030018"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview (2018). \nhttps:\/\/doi.org\/10.6028\/NIST.IR.8202","DOI":"10.6028\/NIST.IR.8202"},{"issue":"4","key":"22_CR10","doi-asserted-by":"publisher","first-page":"3796","DOI":"10.1109\/COMST.2019.2928178","volume":"21","author":"M Belotti","year":"2019","unstructured":"Belotti, M., Bo\u017ei\u0107, N., Pujolle, G., Secci, S.: A vademecum on blockchain technologies: when, which and how. IEEE Commun. Surv. Tutor. 21(4), 3796\u20133838 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"22_CR11","doi-asserted-by":"publisher","first-page":"7992","DOI":"10.1109\/JIOT.2019.2904303","volume":"6","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992\u20138004 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"22_CR12","first-page":"19","volume":"4","author":"N Bakar","year":"2017","unstructured":"Bakar, N., Rosbi, S., Uzaki, K.: Cryptocurrency framework diagnostics from islamic finance perspective: a new insight of bitcoin system transaction. Int. J. Manage. Sci. Bus. Adm. 4(1), 19\u201328 (2017)","journal-title":"Int. J. Manage. Sci. Bus. Adm."},{"issue":"9","key":"22_CR13","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1109\/TPDS.2019.2900238","volume":"30","author":"Y Jiao","year":"2019","unstructured":"Jiao, Y., Wang, P., Niyato, D., Suankaewmanee, K.: Auction mechanisms in cloud\/fog computing resource allocation for public blockchain networks. IEEE Trans. Parallel Distrib. Syst. 30(9), 1975\u20131989 (2019)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"issue":"4","key":"22_CR15","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43575-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T20:09:12Z","timestamp":1585080552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43575-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030435745","9783030435752"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43575-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iwdw2019.net\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}