{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:48Z","timestamp":1725491868519},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_14","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"201-215","source":"Crossref","is-referenced-by-count":3,"title":["Steganography for Radio Amateurs\u2014 A DSSS Based Approach for Slow Scan Television"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Westfeld","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"International Telephone and Telegraph Consultative Committee (CCITT): Implementing order for the radio regulations (German designation: VO Funk) (1982)"},{"key":"14_CR2","unstructured":"German Federal Ministry of Economics and Labour: Ordinance concerning the Amateur Radio Act (German designation: AFuV) (2005), Online available at \n                    \n                      http:\/\/bundesrecht.juris.de\/bundesrecht\/afuv_2005\/gesamt.pdf"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Tachibana, R., Shimizu, S., Nakamura, T., Kobayashi, S.: An audio watermarking method robust against time- and frequency-fluctuation. In: Delp, E.J., Wong, P.W., (eds.) Security, Steganography and Watermarking of Multimedia Contents III (Proc. of SPIE), San Jose, CA, pp. 104\u2013115 (2001)","DOI":"10.1117\/12.435390"},{"key":"14_CR4","unstructured":"van der Veen, M., Bruekers, F., Haitsma, J., Klaker, T., Lemma, A.N., Oomen, W.: Robust multi-functional and high-quality audio watermarking technology. In: 110th Audio Engineering Society Convention. Volume Convention Paper 5345 (2001)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1109\/TSP.2003.809384","volume":"51","author":"D. Kirovski","year":"2003","unstructured":"Kirovski, D., Malvar, H.S.: Spread-spectrum watermarking of audio signals. IEEE Trans. on Signal Processing\u00a051, 1020\u20131033 (2003)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Steinebach, M., Petitcolas, F., Raynal, F., Dittmann, J., Fontaine, C., Seibel, S., Fates, N., Ferri, L.: StirMark benchmark: audio watermarking attacks. In: International Conference on Information Technology: Coding and Computing, pp.49\u201354 (2001)","DOI":"10.1109\/ITCC.2001.918764"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"L.M. Marvel","year":"1999","unstructured":"Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing\u00a08, 1075\u20131083 (1999)","journal-title":"IEEE Transactions on Image Processing"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TCOM.1982.1095533","volume":"30","author":"R.L. Pickholtz","year":"1982","unstructured":"Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of spread-spectrum communications\u2014a tutorial. IEEE Transactions on Communications\u00a030, 855\u2013884 (1982)","journal-title":"IEEE Transactions on Communications"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"F.A.P. Petitcolas","year":"1998","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 219\u2013239. Springer, Heidelberg (1998)"},{"key":"14_CR10","unstructured":"R Development Core Team: R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria (2005), Online available at \n                    \n                      http:\/\/www.R-project.org\n                    \n                    \n                   ISBN 3-900051-07-0"},{"key":"14_CR11","unstructured":"CCIR: Recommendation 520-1, Use of high frequency ionospheric channel simulators. Recommendations of the CCIR III, pp. 57\u201358 (1990)"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TCOM.1970.1090438","volume":"18","author":"C.C. Watterson","year":"1970","unstructured":"Watterson, C.C., Juroshek, J.R., Bensema, W.D.: Experimental confirmation of an HF channel model. IEEE Transactions on Communication Technology\u00a018, 792\u2013803 (1970)","journal-title":"IEEE Transactions on Communication Technology"},{"key":"14_CR13","volume-title":"Proceedings of the 18th ARRL and TAPR","author":"J.B. Forrer","year":"1999","unstructured":"Forrer, J.B.: A low-cost HF channel simulator for testing and evaluating HF digital systems. In: Proceedings of the 18th ARRL and TAPR. Digital Communications Conference, Phoenix, Arizona (1999), \n                    \n                      http:\/\/www.tapr.org\/pub_dcc18.html"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1109\/JSAC.1987.1146531","volume":"5","author":"E. Eleftheriou","year":"1987","unstructured":"Eleftheriou, E., Falconer, D.D.: Adaptive equalization techniques for HF channels. IEEE Journal on Selected Areas in Communications\u00a05, 238\u2013247 (1987)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"14_CR15","unstructured":"Furman, W.N., Nieto, J.W.: Understanding HF channel simulator requirements in order to reduce HF modem performance measurement variability. In: Proceedings of HF01, the Nordic HF Conference, F\u00e5r\u00f6, Sweden (2001), Online available at \n                    \n                      http:\/\/www.nordichf.org\/index.htm?forms\/cdrom.htm&2"},{"key":"14_CR16","unstructured":"Wumpus: Einige SSTV-Modi (1997), Online available at \n                    \n                      http:\/\/home.snafu.de\/wumpus\/sstvmod.htm"},{"key":"14_CR17","unstructured":"Maes, J.: QSSTV (2005), Online available at \n                    \n                      http:\/\/users.telenet.be\/on4qz\/qsstv\/"},{"key":"14_CR18","volume-title":"Wireless Communications: Principles and Practice","author":"T.S. Rappaport","year":"1996","unstructured":"Rappaport, T.S.: Wireless Communications: Principles and Practice. IEEE Press, Piscataway (1996)"},{"key":"14_CR19","volume-title":"Digital and Analog Communication Systems","author":"L.W. Couch II","year":"2001","unstructured":"Couch II, L.W.: Digital and Analog Communication Systems. Prentice Hall, Upper Saddle River (2001)"},{"key":"14_CR20","unstructured":"Walma, M.: BCJR turbo code encoder\/decoder (1998), Online available at \n                    \n                      http:\/\/cvs.berlios.de\/cgi-bin\/viewcvs.cgi\/ofdm\/soundmodem\/newqpsk\/turbo.c?rev=HEAD"},{"key":"14_CR21","volume-title":"Introduction to Continuous and Digital Control Systems.","author":"R. Saucedo","year":"1968","unstructured":"Saucedo, R., Schiring, E.E.: Introduction to Continuous and Digital Control Systems. Macmillan, New York (1968)"},{"key":"14_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3136-4","volume-title":"Digital Communications","author":"E.A. Lee","year":"1994","unstructured":"Lee, E.A., Messerschmitt, D.G.: Digital Communications. Kluwer Academic Publishers, Boston (1994)"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-49380-8_20","volume-title":"Information Hiding (2nd International Workshop)","author":"M. Maes","year":"1998","unstructured":"Maes, M.: Twin Peaks: The histogram attack to fixed depth image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 290\u2013305. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:16Z","timestamp":1619518276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}