{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T03:44:59Z","timestamp":1776311099284,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540741237","type":"print"},{"value":"9783540741244","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_18","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T23:06:39Z","timestamp":1189638399000},"page":"265-281","source":"Crossref","is-referenced-by-count":46,"title":["Batch Steganography and Pooled Steganalysis"],"prefix":"10.1007","author":[{"given":"Andrew D.","family":"Ker","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Trivedi, S., Chandramouli, R.: Active steganalysis of sequential steganography. In: Delp III, E.J., Wong, P.W. (eds.): Security and Watermarking of Multimedia Contents V. In: Proc. SPIE, vol. 5020, pp. 123\u2013130 (2003)","DOI":"10.1117\/12.473115"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-36415-3_23","volume-title":"Information Hiding","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 355\u2013372. Springer, Heidelberg (2003)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Delp III, E.J., Wong, P.W. (eds.): Security, Steganography, and Watermarking of Multimedia Contents VI. In: Proc. SPIE, vol. 5306, pp. 23\u201334 (2004)","DOI":"10.1117\/12.521350"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, R., Ker, A.: A two-factor error model for quantitative steganalysis. In: Delp III, E.J., Wong, P.W. (eds.): Security, Steganography and Watermarking of Multimedia Contents VIII. In: Proc. SPIE, vol. 6072, pp. 59\u201374 (2006)","DOI":"10.1117\/12.643701"},{"key":"18_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-009-5897-5","volume-title":"Finite Mixture Distributions","author":"B. Everitt","year":"1981","unstructured":"Everitt, B., Hand, D.: Finite Mixture Distributions. Chapman and Hall, Sydney, Australia (1981)"},{"key":"18_CR6","volume-title":"Limit Distributions for Sums of Independent Random Variables","author":"B. Gnedenko","year":"1954","unstructured":"Gnedenko, B., Kolmogorov, A.: Limit Distributions for Sums of Independent Random Variables. Addison-Wesley, London, UK (1954)"},{"key":"18_CR7","volume-title":"Handbook of Statistics","author":"J. Marin","year":"2006","unstructured":"Marin, J., Mengersen, K., Robert, C.: Bayesian modelling and inference on mixtures of distributions. In: Dey, D., Rao, C. (eds.) Handbook of Statistics, vol.\u00a025, Elsevier, Amsterdam (2006)"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1137\/0916069","volume":"16","author":"R. Byrd","year":"1995","unstructured":"Byrd, R., Lu, P., Nocedal, J., Zhu, C.: A limited memory algorithm for bound constrained optimization. SIAM J. Scientific Computing\u00a016, 1190\u20131208 (1995)","journal-title":"SIAM J. Scientific Computing"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1214\/aoms\/1177732360","volume":"9","author":"S. Wilks","year":"1938","unstructured":"Wilks, S.: The large-sample distribution of the likelihood ratio for testing composite hypotheses. Ann. Mathematical Statistics\u00a09, 60\u201362 (1938)","journal-title":"Ann. Mathematical Statistics"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1214\/aos\/996986505","volume":"29","author":"J. Fan","year":"2001","unstructured":"Fan, J., Zhang, C., Zhang, J.: Generalized likelihood ratio statistics and Wilks phenomenon. Annals of Statistics\u00a029, 153\u2013193 (2001)","journal-title":"Annals of Statistics"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Pilla, R., Loader, C., Taylor, C.: New technique for finding needles in haystacks: Geometric approach to distinguishing between a new source and random fluctuations. Phys. Review Letters 95 (2005)","DOI":"10.1103\/PhysRevLett.95.230202"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/11558859_22","volume-title":"Information Hiding","author":"A. Ker","year":"2005","unstructured":"Ker, A.: A general framework for the structural steganalysis of LSB replacement. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 296\u2013311. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:11:17Z","timestamp":1619503877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}