{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:08:34Z","timestamp":1725548914247},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248392"},{"type":"electronic","value":"9783540318057"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_12","type":"book-chapter","created":{"date-parts":[[2010,2,28]],"date-time":"2010-02-28T19:26:13Z","timestamp":1267385173000},"page":"137-151","source":"Crossref","is-referenced-by-count":1,"title":["On Security Notions of Steganographic Systems"],"prefix":"10.1007","author":[{"given":"Kisik","family":"Chang","sequence":"first","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Bao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hyungjun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-61996-8_30","volume-title":"Information Hiding","author":"R.J. Anderson","year":"1996","unstructured":"Anderson, R.J.: Stretching the Limits of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 39\u201348. Springer, Heidelberg (1996)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-49380-8_25","volume-title":"Information Hiding","author":"S. Craver","year":"1998","unstructured":"Craver, S.: On Public-Key Steganography in the presence of an Active Warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 255\u2013368. Springer, Heidelberg (1998)"},{"key":"12_CR4","unstructured":"Goldwasser, G., Bellare, M.: Lecture Notes on Modern Cryptography (August 2001), Available at, http:\/\/www-cse.ucsd.edu\/users\/mihir\/papers\/gb.html"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"N.J. Hopper","year":"2002","unstructured":"Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 77\u201392. Springer, Heidelberg (2002)"},{"key":"12_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4375-6","volume-title":"Information Hiding: Steganography and Watermarking Attacks and Contermeasures","author":"N.F. Johnson","year":"2001","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking Attacks and Contermeasures. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"12_CR7","unstructured":"Katzen Beisser, S., Petitcolas, F.A.P.: Information Hiding - techniques for steganography and digital watermarking. Artech House Books (1999)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Defining Security in Steganographic Systems. In: Proceeding of the SPIE. Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 50\u201356 (2002)","DOI":"10.1117\/12.465313"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology: Proceedings of Crypto 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The Prisoners\u2019 Problem and the Subliminal Channe. In: Advances in Cryptology 1983, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-49380-8_24","volume-title":"Information Hiding","author":"J. Z\u00f6llner","year":"1998","unstructured":"Z\u00f6llner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the Security of Steganographic Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 344\u2013354. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T09:20:09Z","timestamp":1558862409000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}