{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:56:29Z","timestamp":1773654989009,"version":"3.50.1"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319651262","type":"print"},{"value":"9783319651279","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_23","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"288-298","source":"Crossref","is-referenced-by-count":6,"title":["Steganalysis Based on Statistical Properties of the Encrypted Messages"],"prefix":"10.1007","author":[{"given":"Valery","family":"Korzhik","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Fedyanin","sequence":"additional","affiliation":[]},{"given":"Artur","family":"Godlewski","sequence":"additional","affiliation":[]},{"given":"Guillermo","family":"Morales-Luna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, 1st edn. Cambridge University Press, New York (2009)","edition":"1"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis: the investigation of hidden information. In: 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228), pp. 113\u2013116, September 1998","DOI":"10.1109\/IT.1998.713394"},{"key":"23_CR3","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. The CRC Press Series on Discrete Mathematics and Its Applications, pp. 33431\u20139868. CRC Press, 2000 N.W. Corporate Blvd, Boca Raton (1997)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography (2005)","DOI":"10.1117\/12.585987"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Bassham III, L.E., Rukhin, A.L., Soto, J., Nechvatal, J.R., Smid, M.E., Barker, E.B., Leigh, S.D., Levenson, M., Vangel, M., Banks, D.L., Heckert, N.A., Dray, J.F., Vo, S.: Spp. 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Gaithersburg, MD, United States (2010)","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"23_CR6","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"AD Ker","year":"2005","unstructured":"Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12, 441\u2013444 (2005)","journal-title":"IEEE Signal Process. Lett."},{"key":"23_CR7","first-page":"123","volume":"20","author":"B Schneier","year":"1995","unstructured":"Schneier, B.: The GOST encryption algorithm. Dr. Dobb\u2019s J. 20, 123\u2013124 (1995)","journal-title":"Dr. Dobb\u2019s J."},{"key":"23_CR8","unstructured":"MacWilliams, F., Sloane, N.: The Theory of Error-Correcting Codes. North-Holland (1977)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Information Hiding","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161\u2013177. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-16435-4_13"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:13:58Z","timestamp":1569968038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}