{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:08:43Z","timestamp":1725548923653},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248392"},{"type":"electronic","value":"9783540318057"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31805-7_14","type":"book-chapter","created":{"date-parts":[[2010,2,28]],"date-time":"2010-02-28T19:26:13Z","timestamp":1267385173000},"page":"163-170","source":"Crossref","is-referenced-by-count":0,"title":["Steganographic Scheme Using a Block Cipher"],"prefix":"10.1007","author":[{"given":"Jeong Jae","family":"Yu","sequence":"first","affiliation":[]},{"given":"Chang-ho","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Seok-Koo","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"61","volume":"21","author":"A. Westfeld","year":"1999","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. Information Hiding\u00a021, 61\u201376 (1999)","journal-title":"Information Hiding"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"#cr-split#-14_CR3.1","unstructured":"Kahn, D.: The Codebreakers-The Story of Secret Writing. Scribner, New York (1996);"},{"key":"#cr-split#-14_CR3.2","unstructured":"Proceedings of CRYPTO 1983, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale image. Magazine of IEEE Multimedia, 22\u201328 (2001)","DOI":"10.1109\/93.959097"},{"key":"14_CR5","unstructured":"Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323\u2013335 (2001)"},{"key":"14_CR6","unstructured":"http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31805-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T09:20:29Z","timestamp":1558862429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31805-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248392","9783540318057"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31805-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}