{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T15:15:08Z","timestamp":1726154108002},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_21","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"314-327","source":"Crossref","is-referenced-by-count":68,"title":["Modified Matrix Encoding Technique for Minimal Distortion Steganography"],"prefix":"10.1007","author":[{"given":"Younhee","family":"Kim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zoran","family":"Duric","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dana","family":"Richards","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.: On the limits of steganography. IEEE Journal on Selected Areas in Communications\u00a016, 474\u2013481 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-540-30114-1_7","volume-title":"Information Hiding","author":"R. B\u00f6hme","year":"2004","unstructured":"B\u00f6hme, R., Westfeld, A.: Exploiting preserved statistics for steganalysis. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 82\u201396. Springer, Heidelberg (2004)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"21_CR4","unstructured":"Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List (1998), http:\/\/os.inf.tu-dresden.de\/~westfeld\/crandall.pdf"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Proc. 6th Information Hiding Workshop, Toronto, Canada (2004)","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"21_CR6","volume-title":"Attacking the OutGuess","author":"J. Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. Proc. ACM Workshop Multimedia and Security 2002. ACM Press, New York (2002)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du. R.: Detecting Steganography LSB in color and gray-scale images. IEEE Multimedia Magazine, 22\u201328 (October 2001)","DOI":"10.1109\/93.959097"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proc. ACM Multimedia Workshop, Magdeburg, Germany (2004)","DOI":"10.1145\/1022431.1022435"},{"key":"21_CR10","volume-title":"Digital Image Processing\u2019","author":"R.C. Gonzales","year":"2002","unstructured":"Gonzales, R.C., Woods, R.E.: Digital Image Processing\u2019. Addison-Wesley, London (2002)"},{"key":"21_CR11","volume-title":"Information Hiding: Steganography and Watermarking \u2014 Attacks and Countermeasures","author":"N. Johnson","year":"2000","unstructured":"Johnson, N., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking \u2014 Attacks and Countermeasures. Kluwer Academic Publishers, Boston (2000)"},{"volume-title":"Information Hiding: Techniques for Steganography and Digital Watermarking","year":"2000","key":"21_CR12","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)"},{"key":"21_CR13","unstructured":"Joint Photographic Experts Group, http:\/\/www.jpeg.org\/public\/jpeghomepage.htm"},{"key":"21_CR14","volume-title":"Probability, Random Variables, and Stochastic Processes","author":"A. Paopoulis","year":"1991","unstructured":"Paopoulis, A.: Probability, Random Variables, and Stochastic Processes. McGraw-Hill, Boston (1991)"},{"key":"21_CR15","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proc. 10th USENIX Security Symposium, pp. 323\u2013325 (2001)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201375. Springer, Heidelberg (2000)"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2014a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"21_CR19","volume-title":"Disappearing Cryptography","author":"P. Wayner","year":"2002","unstructured":"Wayner, P.: Disappearing Cryptography, 2nd edn. Morgan Kaufmann, San Francisco (2002)","edition":"2"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Kim, Y., Duric, Z., Richards, D.: Limited Distortion in LSB Steganography. In: Proc. SPIE Electronic Image (2006)","DOI":"10.1117\/12.650169"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:20Z","timestamp":1619518280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}