{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:09:20Z","timestamp":1760202560375},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74124-4_20","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"297-313","source":"Crossref","is-referenced-by-count":4,"title":["Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks"],"prefix":"10.1007","author":[{"given":"Tri","family":"Van Le","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kaoru","family":"Kurosawa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications\u00a016(4), 474\u2013481 (1998)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"20_CR2","unstructured":"Backes, M., Cachin, C.: Public key steganography with active attacks. Technical report, IACR ePrint Archive 2003\/231 (2003)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-49380-8_25","volume-title":"Information Hiding","author":"S. Craver","year":"1998","unstructured":"Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 14\u201317. Springer, Heidelberg (1998)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Csiszar.: The method of types. IEEETIT: IEEE Transactions on Information Theory, 44 (1998)","DOI":"10.1109\/18.720546"},{"key":"20_CR6","volume-title":"Information theory: Coding Theory for Discrete Memoryless Systems","author":"I. Csiszar","year":"1981","unstructured":"Csiszar, I., Korner, J.: Information theory: Coding Theory for Discrete Memoryless Systems. Academic Press, NewYork (1981)"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Eurocrypt \u201988","author":"G. Gurther","year":"1988","unstructured":"Gurther, G.: A universal algorithm for homophonic coding. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, Springer, Heidelberg (1988)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"N. Hopper","year":"2002","unstructured":"Hopper, N., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, Springer, Heidelberg (2002)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Hopper, N., von Ahn, L.: Public key steganography. In: Crypto 2003 (submitted)","DOI":"10.1007\/978-3-540-24676-3_20"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.: On defining security in steganographic systems (2002)","DOI":"10.1117\/12.465313"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/10719724_1","volume-title":"Information Hiding","author":"Mittelholzer","year":"2000","unstructured":"Mittelholzer. An information-theoretic approach to steganography and watermarking. In A.\u00a0Pfitzmann, editor, Proceedings of Third International Workshop on Information Hiding, volume 1768 of LNCS. Springer-Verlag, September 1998."},{"key":"20_CR12","unstructured":"Moulin, P., O\u2019Sullivan, J.: Information-theoretic analysis of information hiding (1999)"},{"key":"20_CR13","unstructured":"Reyzin, L., Russell, S.: More efficient provably secure steganography. Technical report, IACR ePrint Archive 2003\/093 (2003)"},{"key":"20_CR14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology: Proceedings of Crypto 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The prisoner\u2019s problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of Crypto 1983, New York, USA, pp. 51\u201370. Plenum Publishing, New York, USA (1984)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Hopper, N.: Public key steganography. In: Eurocrypt 2004 (submitted)","DOI":"10.1007\/978-3-540-24676-3_20"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Zollner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Information Hiding, pp. 344\u2013354 (1998)","DOI":"10.1007\/3-540-49380-8_24"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T04:00:29Z","timestamp":1684036829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540741237","9783540741244"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}