{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:46:13Z","timestamp":1773085573340,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540773696","type":"print"},{"value":"9783540773702","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_3","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T07:14:38Z","timestamp":1199344478000},"page":"32-49","source":"Crossref","is-referenced-by-count":18,"title":["Steganographic Communication with Quantum Information"],"prefix":"10.1007","author":[{"given":"Keye","family":"Martin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","first-page":"175","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE Computer Society Press, Los Alamitos (1984)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.: Limitations on practical quantum cryptography. Physical Review Letters\u00a086(6) (2000)","DOI":"10.1103\/PhysRevLett.85.1330"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Calsamiglia, J., Barnett, S., L\u00fctkenhaus, N., Suominen, K.: Removal of a single photon by adaptive absorption. Physical Review A\u00a064 (2000)","DOI":"10.1103\/PhysRevA.64.043814"},{"issue":"9","key":"3_CR4","doi-asserted-by":"publisher","first-page":"4531","DOI":"10.1063\/1.1495073","volume":"43","author":"J. Gea-Banacloche","year":"2002","unstructured":"Gea-Banacloche, J.: Hiding messages in quantum data. Journal of Mathematical Physics\u00a043(9), 4531\u20134536 (2002)","journal-title":"Journal of Mathematical Physics"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-49208-9_17","volume-title":"Quantum Computing and Quantum Communications","author":"R.J. Hughes","year":"1999","unstructured":"Hughes, R.J., et al.: Practical free-space quantum cryptography. In: Williams, C.P. (ed.) QCQC 1998. LNCS, vol.\u00a01509, pp. 200\u2013213. Springer, Heidelberg (1999)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"63814","DOI":"10.1103\/PhysRevA.66.063814","volume":"66","author":"P. Kok","year":"2002","unstructured":"Kok, P., Lee, H., Dowling, J.: Single-photon quantum-nondemolition detectors constructed with linear optics and projective measurements. Physical Review A\u00a066, 063814 (2002)","journal-title":"Physical Review A"},{"key":"3_CR7","first-page":"104","volume-title":"Proceedings of the IEEE International Symposium on Information Theory","author":"E.E. Majani","year":"1991","unstructured":"Majani, E.E., Rumsey, H.: Two results on binary-input discrete memoryless channels. In: Proceedings of the IEEE International Symposium on Information Theory, pp. 104\u2013104. IEEE Computer Society Press, Los Alamitos (1991)"},{"key":"3_CR8","volume-title":"Quantum computation and quantum information","author":"M. Nielsen","year":"2000","unstructured":"Nielsen, M., Chuang, I.: Quantum computation and quantum information. Cambridge University Press, Cambridge (2000)"},{"key":"3_CR9","first-page":"68","volume":"27","author":"J.E. Nordholt","year":"2002","unstructured":"Nordholt, J.E., Hughes, R.J.: A new face for cryptography. Los Alamos Science\u00a027, 68\u201386 (2002)","journal-title":"Los Alamos Science"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","author":"K. Martin","year":"2001","unstructured":"Martin, K., Moskowitz, I.S.: Noisy timing channels with binary inputs and outputs. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol.\u00a02137, Springer, Heidelberg (2001)"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Systems Technical Journal\u00a027, 379\u2013423, 623\u2013656 (1948)","journal-title":"Bell Systems Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T13:39:36Z","timestamp":1557149976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}