{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:49Z","timestamp":1725491869528},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_8","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"109-123","source":"Crossref","is-referenced-by-count":4,"title":["Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens"],"prefix":"10.1007","author":[{"given":"Richard","family":"Bergmair","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","first-page":"3","volume":"16","author":"R.L. Ackoff","year":"1989","unstructured":"Ackoff, R.L.: From data to wisdom. Journal of Applied Systems Analysis\u00a016, 3\u20139 (1989)","journal-title":"Journal of Applied Systems Analysis"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-45496-9_14","volume-title":"Information Hiding: Fourth International Workshop","author":"M.J. Atallah","year":"2001","unstructured":"Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. LNCS, vol.\u00a02137, pp. 185\u2013199. Springer, Heidelberg (2001)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-36415-3_13","volume-title":"Information Hiding: Fifth International Workshop","author":"M.J. Atallah","year":"2002","unstructured":"Atallah, M.J., Raskin, V., Hempelmann, C.F., Topkara, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural language watermarking and tamperproofing. In: Fabien, A.P.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 196\u2013212. Springer, Heidelberg (2002)"},{"key":"8_CR4","unstructured":"Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text (May 2004)"},{"key":"8_CR5","unstructured":"Bergmair, R.: Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. final year project, April 2004 submitted in partial fulfillment of the degree requirements for B.Sc (Hons.) to the University of Derby (2004)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b98117","volume-title":"Information Security","author":"R. Bergmair","year":"2004","unstructured":"Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, Springer, Heidelberg (2004)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/978-3-540-30114-1_13","volume-title":"Information Hiding: 6th International Workshop","author":"I.A. Bolshakov","year":"2004","unstructured":"Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 180\u2013191. Springer, Heidelberg (2004)"},{"key":"8_CR8","unstructured":"Calvo, H., Bolshakov, I.A.: Using selectional preferences for extending a synonymous paraphrasing method in steganography. In: Sossa Azuela, J.H. (ed.) Avances en Ciencias de la Computacion e Ingenieria de Computo - CIC 2004: XIII Congreso Internacional de Computacion, pp. 231\u2013242 (October 2004)"},{"key":"8_CR9","volume-title":"Hiding the hidden: A software system for concealing ciphertext as innocuous text","author":"M. Chapman","year":"1997","unstructured":"Chapman, M.: Hiding the hidden: A software system for concealing ciphertext as innocuous text. Master\u2019s thesis, University of Wisconsin-Milwaukee (1997)"},{"key":"8_CR10","unstructured":"Chapman, M., Davida, G.I.: Nicetext system official home page, \n                    \n                      http:\/\/www.nicetext.com"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","first-page":"11","volume-title":"Information and Communications Security \u2014 First International Conference","author":"M. Chapman","year":"1997","unstructured":"Chapman, M., Davida, G.I.: Hiding the hidden: A software system for concealing ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 11\u201314. Springer, Heidelberg (1997)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"InfraSec 2002","author":"M. Chapman","year":"2002","unstructured":"Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) InfraSec 2002. LNCS, vol.\u00a02437, Springer, Heidelberg (2002)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security Conference (ISC \u201901)","author":"M. Chapman","year":"2001","unstructured":"Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, Springer, Heidelberg (2001)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security","author":"M. Chew","year":"2004","unstructured":"Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, Springer, Heidelberg (2004)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-24624-4_10","volume-title":"Digital Watermarking: Second International Workshop, IWDW 2003","author":"Y.-L. Chiang","year":"2004","unstructured":"Chiang, Y.-L., Chang, L.-P., Hsieh, W.-T., Chen, W.-C.: Natural language watermarking using semantic substitution for chinese text. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 129\u2013140. Springer, Heidelberg (2004)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/3-540-49380-8_25","volume-title":"Information Hiding, Second International Workshop, Proceedings","author":"S. Craver","year":"1998","unstructured":"Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 355\u2013368. Springer, Heidelberg (1998)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/s00530-003-0100-9","volume":"9","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems\u00a09, 298\u2013302 (2003)","journal-title":"Multimedia Systems"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/11558859_17","volume-title":"Information Hiding, 7th International Workshop (IH 2005)","author":"C. Grothoff","year":"2005","unstructured":"Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M.: Translation-based steganography. In: Barni, M., Herrera-Joancomarti, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) Information Hiding, 7th International Workshop (IH 2005), Barcelona, Spain. LNCS, vol.\u00a03727, pp. 219\u2013233. Springer, Heidelberg (2005)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Advances in Crypotology. In: Proceedings of Asiacrypt 2001 (2001)","DOI":"10.1007\/3-540-45682-1_4"},{"key":"8_CR20","unstructured":"Nasir Memon Mehdi Kharrazi, H.T.S.: Blind source camera identification. In: Proceedings of the National Conference on Image Processing (ICIP 2004) (2004)"},{"issue":"9","key":"8_CR21","first-page":"2339","volume":"42","author":"H. Nakagawa","year":"2001","unstructured":"Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning \u2013 a case for japanese documents. IPSJ Transaction\u00a042(9), 2339\u20132350 (2001)","journal-title":"IPSJ Transaction"},{"key":"8_CR22","unstructured":"Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ Journal, 44(8) (August 2003)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: The prisoners problem and the subliminal channel. In: Advances in Cryptology. In: Proceedings of CRYPTO 1983, pp. 51\u201367 (1984)","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Topkara, M., Taskiran, C.M., Delp, E.J.: Natural language watermarking. In: Delp, E.J., Wong, P.W.(eds) Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681 (January 2005)","DOI":"10.1117\/12.593790"},{"key":"8_CR25","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: HIPs, \n                    \n                      http:\/\/www.aladdin.cs.cmu.edu\/hips\/"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology, Eurocrypt 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard ai problems for security. In: Advances in Cryptology, Eurocrypt 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0161-119291866883","volume":"XVI\/3","author":"P. Wayner","year":"1992","unstructured":"Wayner, P.: Mimic functions. Cryptologia\u00a0XVI\/3, 193\u2013214 (1992)","journal-title":"Cryptologia"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1080\/0161-119591883962","volume":"XIX\/3","author":"P. Wayner","year":"1995","unstructured":"Wayner, P.: Strong theoretical steganography. Cryptologia\u00a0XIX\/3, 285\u2013299 (1995)","journal-title":"Cryptologia"},{"key":"8_CR29","unstructured":"Winstein, K.: Lexical steganography, \n                    \n                      http:\/\/alumni.imsa.edu\/~keithw\/tlex"},{"key":"8_CR30","unstructured":"Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash, \n                    \n                      http:\/\/alumni.imsa.edu\/~keithw\/tlex\/lsteg.ps"},{"key":"8_CR31","unstructured":"Xerox PARC. In: First Workshop on Human Interactive Proofs (January 2002)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:25Z","timestamp":1619518285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}