{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:39:23Z","timestamp":1725557963817},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407973"},{"type":"electronic","value":"9783540452157"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45215-7_34","type":"book-chapter","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T00:27:59Z","timestamp":1277339279000},"page":"395-406","source":"Crossref","is-referenced-by-count":17,"title":["Steganography with Least Histogram Abnormality"],"prefix":"10.1007","author":[{"given":"Xinpeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shuozhong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kaiwen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding -\u2014 A Survey. Proc. IEEE\u00a087, 1062\u20131078 (1999)","journal-title":"Proc. IEEE"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Practical Steganalysis of Digital Images\u2014State of the Art. In: Proceedings of SPIE, San Jose, USA, vol.\u00a04675, pp. 1\u201313 (2002)","DOI":"10.1117\/12.465263"},{"key":"34_CR3","unstructured":"Wang, H., Wang, S.: Cyber Warfare \u2014 Steganography vs. Steganalysis. Communication of the ACM (in press)"},{"key":"34_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"1999","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (1999)"},{"key":"34_CR5","unstructured":"Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. CITI Technical Report 01\u201311 (2001)"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray-Scale Images. Magazine of IEEE Multimedia, 22\u201328 (October-December 2001); special Issue on Security","DOI":"10.1109\/93.959097"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Du, R., Long, M.: Steganalysis of LSB Encoding in Color Images. In: IEEE Int. Conf. on Multimedia and Expo, vol.\u00a03, pp. 1279\u20131282 (2000)","DOI":"10.1109\/ICME.2000.871000"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Steganalysis Based on JPEG Compatibility. In: Proceedings of SPIE, vol. 4518, pp. 275\u2013280 (2001)","DOI":"10.1117\/12.448213"},{"key":"34_CR9","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proc. of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6 (2002)"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Image: Breaking the F5 Algorithm. In: 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands (October 2002)","DOI":"10.1007\/3-540-36415-3_20"},{"key":"34_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2014 A Steganographic Algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Detecting Hidden Message Using Higher-Order Statistics and Support Vector Machines. In: 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 7\u20139 October (2002)","DOI":"10.1007\/3-540-36415-3_22"},{"key":"34_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/3-540-49380-8_22","volume-title":"Information Hiding","author":"J. Ettinger","year":"1998","unstructured":"Ettinger, J.: Steganalysis and Game Equilibria. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 319\u2013328. Springer, Heidelberg (1998)"},{"key":"34_CR14","unstructured":"Provos, N.: Defending against Statistical Steganalysis. In: 10th USENIX Security Symposium, Washington, DC (2001)"},{"key":"34_CR15","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s11741-002-0049-5","volume":"6","author":"S. Wang","year":"2002","unstructured":"Wang, S., Zhang, X., Zhang, K.: Steganographic Technique Capable of Withstanding RQP Analysis. Journal of Shanghai University\u00a06, 273\u2013277 (2002)","journal-title":"Journal of Shanghai University"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45215-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T10:57:12Z","timestamp":1559213832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45215-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407973","9783540452157"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45215-7_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}