{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T07:59:33Z","timestamp":1761292773058},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_40","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T23:00:52Z","timestamp":1294354852000},"page":"497-507","source":"Crossref","is-referenced-by-count":4,"title":["A Secure Steganographic Scheme against Statistical Analyses"],"prefix":"10.1007","author":[{"given":"Jeong Jae","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jae Won","family":"Han","sequence":"additional","affiliation":[]},{"given":"Kwang Su","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Seung Cheol","family":"O","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"IL Hwan","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale image. Magazine of IEEE Multimedia, 22\u201328 (2001)","DOI":"10.1109\/93.959097"},{"key":"40_CR3","first-page":"51","volume-title":"Advances in Cryptology, Proceedings of CRYPTO 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The Prisoner\u2019s Problem and the Subliminal Channel. In: Advances in Cryptology, Proceedings of CRYPTO 1983, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"40_CR4","unstructured":"http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"40_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/3-540-38424-3_30","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"U. Maurer","year":"1991","unstructured":"Maurer, U.: A universal statistical test for random bit generators. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 409\u2013426. Springer, Heidelberg (1991)"},{"key":"40_CR6","unstructured":"Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323\u2013335 (2001)"},{"key":"40_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2013A Steganographic Algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:21:32Z","timestamp":1558293692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}