{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:43:19Z","timestamp":1773150199732,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540210610","type":"print"},{"value":"9783540246244","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_12","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"154-167","source":"Crossref","is-referenced-by-count":176,"title":["Model-Based Steganography"],"prefix":"10.1007","author":[{"given":"Phil","family":"Sallee","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications: Special Issue on Copyright and Privacy Protection\u00a016(4), 474\u2013481 (1998)","journal-title":"IEEE Journal of Selected Areas in Communications: Special Issue on Copyright and Privacy Protection"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Buccigrossi, R.W., Simoncelli, E.P.: Progressive Wavelet Image Coding Based on a Conditional Probability Model. In: Proceedings ICASSP 1997, Munich, Germany (1997)","DOI":"10.1109\/ICASSP.1997.595412"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, p. 306. Springer, Heidelberg (1998)"},{"key":"12_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T. Cover","year":"1991","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory. Wiley, New York (1991)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-36415-3_22","volume-title":"Information Hiding","author":"H. Farid","year":"2003","unstructured":"Farid, H., Lyu, S.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 340\u2013354. Springer, Heidelberg (2003)"},{"key":"12_CR6","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proc. ACM: Special Session on Multimedia Security and Watermarking, Juan-les-Pins, France (2002)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"key":"12_CR8","unstructured":"Petitcolas, F.: MP3Stego (1998), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/~fapp2\/steganography\/mp3stego"},{"key":"12_CR9","unstructured":"Provos, N.: Defending Against Statistical Steganalysis. In: Proc. 10th USENIX Security Symposium, Washington, DC (2001)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Simoncelli, E.P., Adelson, E.H.: Noise Removal Via Bayesian Wavelet Coring. In: 3rd IEEE Int\u2019l Conf Image Processing, Lausanne, Switzerland (1996)","DOI":"10.1109\/ICIP.1996.559512"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201375. Springer, Heidelberg (2000)"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: High Capacity Despite Better Steganalysis (F5 - A Steganographic Algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Witten, I.H., Neal, R.M., Cleary, J.G.: Arithmetic coding for data compression. Communications of the ACM\u00a030(6) (1987)","DOI":"10.1145\/214762.214771"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T08:42:04Z","timestamp":1553330524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}