{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:48Z","timestamp":1725491868812},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_19","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"282-296","source":"Crossref","is-referenced-by-count":32,"title":["On Steganographic Embedding Efficiency"],"prefix":"10.1007","author":[{"given":"Jessica","family":"Fridrich","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Petr","family":"Lison\u011bk","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Soukal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J: The prisoners\u2019 problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: High capacity despite better steganalysis F5\u2014a steganographic algorithm. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P. Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image Graphics\u00a05, 167\u2013190 (2005)","journal-title":"International Journal of Image Graphics"},{"key":"19_CR5","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Steganography via codes for memory with defective cells. In: 43rd Conference on Coding, Communication, and Control, September 28\u201330 (2005)"},{"key":"19_CR6","unstructured":"Crandall, R.: Some notes on steganography. Steganography Mailing List (1998), available from \n                    \n                      http:\/\/os.inf.tu-dresden.de\/~westfeld\/crandall.pdf"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Bierbrauer, J.: Introduction to Coding Theory. Chapman & Hall\/CRC (2004)","DOI":"10.1201\/9781482296372"},{"key":"19_CR8","unstructured":"van Dijk, M., Willems, F.: Embedding information in grayscale images. In: Proceedings of the 22nd Symposium on Information and Communication Theory in the Benelux, Enschede, The Netherlands, (May 15\u201316, 2001), pp. 147\u2013154 (2001)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proceedings ITW 2003, Paris, France, pp. 151\u2013154 (2003)","DOI":"10.1109\/ITW.2003.1216717"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TIFS.2005.863487","volume":"1","author":"J. Fridrich","year":"2006","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Security and Forensics\u00a01, 102\u2013110 (2006)","journal-title":"IEEE Transactions on Information Security and Forensics"},{"key":"19_CR11","volume-title":"The Theory of Error-Correcting Codes","author":"F.J.M. Williams","year":"1977","unstructured":"Williams, F.J.M., Sloane, N.J.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"19_CR12","unstructured":"Bierbrauer, J.: On crandall\u2019s problem. Personal Communication (1998), available from \n                    \n                      http:\/\/www.ws.binghamton.edu\/fridrich\/covcodes.pdf"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Soukal, D.: Matrix embedding for large payloads. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, 2006, pp. W1\u2013W15 (2006)","DOI":"10.1117\/12.639933"},{"key":"19_CR14","unstructured":"Cohen, G.D., Honkala, I., Litsyn, S., Lobstein, A.: Covering Codes. Elsevier, North-Holland Mathematical Library, vol. 54 (1997)"},{"key":"19_CR15","unstructured":"Khatirinejad, M., Lison\u011bk, P.: Linear codes for high payload steganography. In: AAECC-16, Las Vegas, Nevada (February 20\u201324, 2006)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/11558859_22","volume-title":"Information Hiding","author":"A. Ker","year":"2005","unstructured":"Ker, A.: A general framework for structural analysis of LSB replacement. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 296\u2013311. Springer, Heidelberg (2005)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Soukal, D., Fridrich, J., Goljan, M.: Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16\u201320, 2005, vol. 5681, pp. 595\u2013606 (2005)","DOI":"10.1117\/12.584426"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Wong, P.W., Chen, H., Tang, Z.: On steganalysis of plus-minus one embedding in continuous-tone images. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16\u201320, 2005, vol. 5681, pp. 643\u2013652 (2005)","DOI":"10.1117\/12.596993"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Ker, A.: Resampling and the detection of LSB matching in color bitmaps. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16\u201320, 2005, vol. 5681, pp. 1\u201315 (2005)","DOI":"10.1117\/12.586622"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"A.D. Ker","year":"2005","unstructured":"Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters\u00a012, 441\u2013444 (2005)","journal-title":"IEEE Signal Processing Letters"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, January 16\u201319, 2006, vol. 6072, pp. 1\u201313 (2006)","DOI":"10.1117\/12.643254"},{"key":"19_CR22","unstructured":"Fridrich, J., Goljan, M., Du, R.: Steganalysis based on JPEG compatibility. In: Tescher, A.G. (ed.) Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20\u201324, 2001, vol. 4518, pp. 275\u2013280 (2001)"},{"key":"19_CR23","first-page":"4","volume-title":"Proceedings ACM Multimedia and Security Workshop","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography using wet paper codes. In: Dittman, J., Fridrich, J. (eds.) Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004, pp. 4\u201315. ACM Press, New York (2004)"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Wainwright, M.J., Maneva, E.: Lossy source encoding via message-passing and decimation over generalized codewords of LDGM codes. In: Proceedings of the International Symposium on Information Theory, Adelaide, Australia (2005)","DOI":"10.1109\/ISIT.2005.1523592"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:19Z","timestamp":1619518279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}