{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:58:14Z","timestamp":1772283494566,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540773696","type":"print"},{"value":"9783540773702","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_10","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T07:14:38Z","timestamp":1199344478000},"page":"145-158","source":"Crossref","is-referenced-by-count":15,"title":["Reducing the Complexity of Syndrome Coding for Embedding"],"prefix":"10.1007","author":[{"given":"Dagmar","family":"Sch\u00f6nfeld","sequence":"first","affiliation":[]},{"given":"Antje","family":"Winkler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Bierbrauer, J.: Crandall\u2019s problem (unpublished) (1998), http:\/\/www.ws.binghamton.edu\/fridrich\/covcodes.pdf"},{"key":"10_CR2","volume-title":"Channel Coding for Telecommunications","author":"M. Bossert","year":"1999","unstructured":"Bossert, M.: Channel Coding for Telecommunications. Wiley, Chichester (1999)"},{"key":"10_CR3","unstructured":"Crandall, R.: Some Notes on steganography. Posted on Steganography Mailing List (1998), http:\/\/os.inf.tu-dresden.de\/~westfeld\/crandall.pdf"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on Wet Paper. Proc. of IEEE Transcription on Signal Processing\u00a053, 3923\u20133935 (2005)","journal-title":"Proc. of IEEE Transcription on Signal Processing"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1117\/12.583160","volume":"5681","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on Wet Paper. Proc. of EI SPIE San Jose\u00a05681, 328\u2013340 (2005)","journal-title":"Proc. of EI SPIE San Jose"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed Quantization Steganography with Wet Paper Codes. In: Proc. of ACM Multimedia and Security Workshop, Germany, pp. 4\u201315 (2004)","DOI":"10.1145\/1022431.1022435"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/11558859_16","volume-title":"Information Hiding","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Efficient Wet Paper Codes. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 204\u2013218. Springer, Heidelberg (2005)"},{"key":"10_CR8","first-page":"727","volume":"6072","author":"J. Fridrich","year":"2006","unstructured":"Fridrich, J., Soukal, D.: Matrix Embedding for Large Payloads. Proc. of EI SPIE San Jose\u00a06072, 727\u2013738 (2006)","journal-title":"Proc. of EI SPIE San Jose"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proc. of IEEE Information Theory Workshop, pp. 151\u2013154 (2004)","DOI":"10.1109\/ITW.2003.1216717"},{"key":"10_CR10","unstructured":"Klimant, H., Piotraschke, R., Sch\u00f6nfeld, D.: Informations- und Kodierungstheorie. Teubner Verlag Wiesbaden (2006)"},{"issue":"11","key":"10_CR11","first-page":"666","volume":"25","author":"D. Sch\u00f6nfeld","year":"2001","unstructured":"Sch\u00f6nfeld, D.: Einbetten mit minimaler Werk\u00e4nderung (Embedding with minimal cover changes). Datenschutz und Datensicherheit DuD, Vieweg Verlag\u00a025(11), 666\u2013671 (2001)","journal-title":"Datenschutz und Datensicherheit DuD, Vieweg Verlag"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nfeld, D., Winkler, A.: Embedding with Syndrome Coding Based on BCH Codes. In: Proc. of ACM Multimedia and Security Workshop, Switzerland, pp. 214\u2013223 (2006)","DOI":"10.1145\/1161366.1161405"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T07:26:27Z","timestamp":1737789987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}