{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:05:01Z","timestamp":1743069901863,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030602758"},{"type":"electronic","value":"9783030602765"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60276-5_38","type":"book-chapter","created":{"date-parts":[[2020,10,4]],"date-time":"2020-10-04T07:02:44Z","timestamp":1601794964000},"page":"389-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Preliminary Investigation of Potential Steganographic Container Localization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7532-9156","authenticated-orcid":false,"given":"Rodmonga","family":"Potapova","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3761-8010","authenticated-orcid":false,"given":"Andrey","family":"Dzhunkovskiy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"38_CR1","unstructured":"Bennet, K.: Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text. CERIAS Tech Report 4, pp. 1\u201330 (2013)"},{"key":"38_CR2","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s00530-003-0101-8","volume":"9","author":"RA Chandramouli","year":"2003","unstructured":"Chandramouli, R.A.: Mathematical framework for active steganalysis. ACM Multimedia Syst. J. 9, 303\u2013311 (2003). Special Issue on Multimedia Watermarking","journal-title":"ACM Multimedia Syst. J."},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-18405-5_21","volume-title":"Digital Watermarking","author":"Z Chen","year":"2011","unstructured":"Chen, Z., Huang, L., Meng, P., Yang, W., Miao, H.: Blind linguistic steganalysis against translation based steganography. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 251\u2013265. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-18405-5_21"},{"issue":"797","key":"38_CR4","first-page":"117","volume":"6","author":"AV Dzhunkovskiy","year":"2018","unstructured":"Dzhunkovskiy, A.V.: Steganography: three-stage analysis methodology applied to Russian written texts. Vestnik Moscow State Linguist. Univ. Humanit. Sci. 6(797), 117\u2013123 (2018)","journal-title":"Vestnik Moscow State Linguist. Univ. Humanit. Sci."},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-030-26061-3_40","volume-title":"Speech and Computer","author":"R Potapova","year":"2019","unstructured":"Potapova, R., Potapov, V., Komalova, L., Dzhunkovskiy, A.: Some peculiarities of internet multimodal polycode corpora annotation. In: Salah, A.A., Karpov, A., Potapova, R. (eds.) SPECOM 2019. LNCS (LNAI), vol. 11658, pp. 392\u2013400. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-26061-3_40"},{"key":"38_CR6","volume-title":"Speech: Communication, Information, Cybernetics","author":"RK Potapova","year":"2015","unstructured":"Potapova, R.K.: Speech: Communication, Information, Cybernetics, 5th edn. URSS, Moscow (2015). (in Russ.)","edition":"5"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Si, H., Li, C.-T.: Fragile watermarking scheme based on the block-wise dependency in the wavelet domain. In: Proceedings of ACM Multimedia and Security Workshop, pp. 214\u2013219 (2004)","DOI":"10.1145\/1022431.1022469"},{"key":"38_CR8","unstructured":"Su, J.K., Eggers, J.J., Girod, B.: Capacity of digital watermarks subjected to an optimal collusion attack. In: Proceedings of European Signal Processing Conference, pp. 1\u20134. IEEE, Tampere (2000)"},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11042-012-1313-8","volume":"3","author":"L Xiang","year":"2014","unstructured":"Xiang, L., Sun, X., Luo, G.: Linguistic steganalysis using the features derived from synonym frequency. Multimedia Tools Appl. 3, 1893\u20131911 (2014). \nhttps:\/\/doi.org\/10.1007\/s11042-012-1313-8","journal-title":"Multimedia Tools Appl."}],"container-title":["Lecture Notes in Computer Science","Speech and Computer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60276-5_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,4]],"date-time":"2020-10-04T07:11:13Z","timestamp":1601795473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60276-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030602758","9783030602765"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60276-5_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPECOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Speech and Computer","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"specom2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/specom.nw.ru\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"160","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic SPECOM 2020 was held as a virtual event","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}