{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T05:26:18Z","timestamp":1737869178394,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773696"},{"type":"electronic","value":"9783540773702"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_25","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T07:14:38Z","timestamp":1199344478000},"page":"378-391","source":"Crossref","is-referenced-by-count":17,"title":["Generalised Category Attack\u2014Improving Histogram-Based Attack on JPEG LSB Embedding"],"prefix":"10.1007","author":[{"given":"Kwangsoo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Westfeld","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Upham, D.: Jsteg (1993), http:\/\/munitions.vipul.net\/software\/steganography\/jpeg-jsteg-v4.diff.gz"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"25_CR3","unstructured":"Provos, N.: Outguess (2001), Online available at http:\/\/www.outguess.org"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2014a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Ro, Y.M., Cox, I.J. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74124-4_17","volume-title":"Information Hiding","author":"Y.Q. Shi","year":"2007","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J., Collberg, C., Johnson, N.F., Sallee, P. (eds.) Information Hiding (8th International Workshop), Berlin Heidelberg. LNCS, vol.\u00a04437, Springer, Heidelberg (2007)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents IX (Proc. of SPIE), San Jose, CA (2007)","DOI":"10.1117\/12.696774"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents V (Proc. of SPIE), San Jose, CA, pp. 178\u2013190 (2003)","DOI":"10.1117\/12.473140"},{"issue":"4","key":"25_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J. Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Multimedia\u00a08(4), 22\u201328 (2001)","journal-title":"IEEE Multimedia"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-36415-3_23","volume-title":"Information Hiding","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 355\u2013372. Springer, Heidelberg (2003)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: Space filling curves in steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VII (Proc. of SPIE), San Jose, CA, pp. 28\u201337 (2005)","DOI":"10.1117\/12.587280"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-30114-1_9","volume-title":"Information Hiding","author":"P. Lu","year":"2004","unstructured":"Lu, P., Luo, X., Tang, Q., Shen, L.: An improved sample pairs method for detection of LSB embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 116\u2013127. Springer, Heidelberg (2004)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in Jsteg-like steganography. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), pp. 673\u2013676 (2004)","DOI":"10.1109\/ICPR.2004.1333862"},{"key":"25_CR14","first-page":"307","volume-title":"SAC 2003","author":"T. Zhang","year":"2003","unstructured":"Zhang, T., Ping, X.: A fast and effective steganalytic technique against Jsteg-like algorithms. In: SAC 2003. Proceedings of the 2003 ACM Symposium on Applied Computing, Melbourne, Florida, USA, March 9\u201312, 2003, pp. 307\u2013311. ACM Press, New York (2003)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11922841_4","volume-title":"Digital Watermarking","author":"K. Lee","year":"2006","unstructured":"Lee, K., Westfeld, A., Lee, S.: Category Attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 35\u201348. Springer, Heidelberg (2006)"},{"key":"25_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11922841_3","volume-title":"Digital Watermarking","author":"A. Westfeld","year":"2006","unstructured":"Westfeld, A.: Steganalysis in the presence of weak cryptography and encoding. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 19\u201334. Springer, Heidelberg (2006)"},{"key":"25_CR17","unstructured":"University of Washington: CBIR image database (2004), http:\/\/www.cs.washington.edu\/research\/imagedatabase\/groundtruth"},{"key":"25_CR18","unstructured":"NRCS: Photo gallery of the USDA Natural Resources Conservation Service (2006), http:\/\/photogallery.nrcs.usda.gov\/"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Smoot, S.R., Rowe, L.A.: Study of DCT coefficient distributions. In: Proceedings of the SPIE Symposium on Electronic Imaging, San Jose, CA, vol.\u00a02657, pp. 403\u2013411 (1996)","DOI":"10.1117\/12.238737"},{"key":"25_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"key":"25_CR21","unstructured":"Provos, N., Honeyman, P.: Detecting steganographic content on the Internet (2001), http:\/\/www.citi.umich.edu\/techreports\/reports\/citi-tr-01-11.pdf"},{"key":"25_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"25_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-30114-1_8","volume-title":"Information Hiding","author":"A.D. Ker","year":"2004","unstructured":"Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 97\u2013115. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T07:26:37Z","timestamp":1737789997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}