{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:17Z","timestamp":1763507657793},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540245735"},{"type":"electronic","value":"9783540305767"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30576-7_13","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T15:03:26Z","timestamp":1278255806000},"page":"227-244","source":"Crossref","is-referenced-by-count":10,"title":["Upper and Lower Bounds on Black-Box Steganography"],"prefix":"10.1007","author":[{"given":"Nenad","family":"Dedi\u0107","sequence":"first","affiliation":[]},{"given":"Gene","family":"Itkis","sequence":"additional","affiliation":[]},{"given":"Leonid","family":"Reyzin","sequence":"additional","affiliation":[]},{"given":"Scott","family":"Russell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Backes, M., Cachin, C.: Public-key steganography with active attacks. Technical Report 2003\/231, Cryptology e-print archive (2004), http:\/\/eprint.iacr.org"},{"issue":"7","key":"13_CR2","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time tradeoffs in hash coding with allowable errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"13_CR3","unstructured":"Broder, A., Mitzenmacher, M.: Network applications of bloom filters: A survey. In: Proceedings of the Fortieth Annual Allerton Conference on Communication, Control and Computing (2002)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013316. Springer, Heidelberg (1998)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Dedi\u0107, N., Itkis, G., Reyzin, L., Russell, S.: Upper and lower bounds on black-box steganography. Technical Report 2004\/246, Cryptology e-print archive (2004), http:\/\/eprint.iacr.org","DOI":"10.1007\/978-3-540-30576-7_13"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM\u00a033(4), 792\u2013807 (1986)","journal-title":"Journal of the ACM"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., Nussboim, A.: On the implementation of huge random objects. In: 44th Annual Symposium on Foundations of Computer Science, Cambridge, Massachusetts, October 2003, pp. 68\u201379 (2003)","DOI":"10.1109\/SFCS.2003.1238182"},{"issue":"4","key":"13_CR8","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1137\/S0097539793244708","volume":"28","author":"J. H\u00e5stad","year":"1999","unstructured":"H\u00e5stad, J., Impagliazzo, R., Levin, L.A., Luby, M.: Construction of pseudorandom generator from any one-way function. SIAM Journal on Computing\u00a028(4), 1364\u20131396 (1999)","journal-title":"SIAM Journal on Computing"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Hopper, N., Langford, J., von Ahn, L.: Provably secure steganography. Technical Report 2002\/137, Cryptology e-print archive (2002), http:\/\/eprint.iacr.org (Preliminary version in Crypto 2002)","DOI":"10.1007\/3-540-45708-9_6"},{"issue":"301","key":"13_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/2282952","volume":"58","author":"W. Hoeffding","year":"1963","unstructured":"Hoeffding, W.: Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association\u00a058(301), 13\u201330 (1963)","journal-title":"Journal of the American Statistical Association"},{"key":"13_CR11","unstructured":"Hopper, N.J.: Toward a Theory of Steganography. PhD thesis, Carnegie Mellon University, Pittsburgh, PA, USA (July 2004), Available as Technical Report CMU-CS-04-157"},{"key":"13_CR12","unstructured":"Kissner, L., Malkin, T., Reingold, O.: Private communication to Hopper, N., Langford, J., von Ahn, L. (2002)"},{"key":"13_CR13","unstructured":"Van Le., T.: Efficient provably secure public key steganography. Technical Report 2003\/156, Cryptology e-print archive (2003), http:\/\/eprint.iacr.org"},{"key":"13_CR14","unstructured":"Van Le, T., Kurosawa, K.: Efficient public key steganography secure against adaptively chosen stegotext attacks. Technical Report 2003\/244, Cryptology e-print archive (2003), http:\/\/eprint.iacr.org"},{"key":"13_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511606267","volume-title":"The Theory of Information and Coding","author":"R.J. McEliece","year":"2002","unstructured":"McEliece, R.J.: The Theory of Information and Coding, 2nd edn. Cambridge University Press, Cambridge (2002)","edition":"2"},{"key":"13_CR16","unstructured":"Reyzin, L.: A Note On the Statistical Difference of Small Direct Products. Technical Report BUCS-TR-2004-032, CS Department, Boston University, September 21 (2004), Available from http:\/\/www.cs.bu.edu\/techreports\/"},{"key":"13_CR17","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology: Proceedings of Crypto 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of Crypto 1983, August 22-24, 1983, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-24676-3_20","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Hopper, N.J.: Public-key steganography. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 323\u2013341. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30576-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:23:48Z","timestamp":1605741828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30576-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245735","9783540305767"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30576-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}