{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:58:14Z","timestamp":1772283494055,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540773696","type":"print"},{"value":"9783540773702","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_9","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T02:14:38Z","timestamp":1199326478000},"page":"130-144","source":"Crossref","is-referenced-by-count":8,"title":["How Can Reed-Solomon Codes Improve Steganographic Schemes?"],"prefix":"10.1007","author":[{"given":"Caroline","family":"Fontaine","sequence":"first","affiliation":[]},{"given":"Fabien","family":"Galand","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-540-30114-1_7","volume-title":"Intelligent Tutoring Systems","author":"R. B\u00f6hme","year":"2004","unstructured":"B\u00f6hme, R., Westfeld, A.: Exploiting preserved statistics for steganalysis. In: Lester, J.C., Vicari, R.M., Paragua\u00e7u, F. (eds.) ITS 2004. LNCS, vol.\u00a03220, pp. 82\u201396. Springer, Heidelberg (2004)"},{"key":"9_CR2","unstructured":"Crandall, R.: Some notes on steganography. Posted on steganography mailing list (1998), http:\/\/os.inf.tu-dresden.de\/~westfeld\/crandall.pdf"},{"issue":"10","key":"9_CR3","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., et al.: Writing on wet paper. IEEE Transactions on Signal Processing\u00a053(10), 3923\u20133935 (2005) (special issue Supplement on Secure Media III)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/11558859_16","volume-title":"Information Hiding","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Efficient wet paper codes. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 204\u2013218. Springer, Heidelberg (2005)"},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s00530-005-0194-3","volume":"11","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography. ACM Multimedia and Security Journal\u00a011(2), 98\u2013107 (2005)","journal-title":"ACM Multimedia and Security Journal"},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TIFS.2005.863487","volume":"1","author":"J. Fridrich","year":"2006","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Security and Forensics\u00a01(1), 102\u2013110 (2006)","journal-title":"IEEE Transactions on Information Security and Forensics"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-36415-3_18","volume-title":"Information Hiding","author":"E. Franz","year":"2003","unstructured":"Franz, E.: Steganography preserving statistical properties. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 278\u2013294. Springer, Heidelberg (2003)"},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"1","author":"J. Fridrich","year":"2006","unstructured":"Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Transactions on Information Security and Forensics\u00a01(3), 390\u2013394 (2006)","journal-title":"IEEE Transactions on Information Security and Forensics"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proc. ITW 2003, pp. 151\u2013154 (2003)","DOI":"10.1109\/ITW.2003.1216717"},{"issue":"6","key":"9_CR10","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.782097","volume":"45","author":"V. Guruswami","year":"1999","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Transactions on Information Theory\u00a045(6), 1757\u20131767 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"W.C. Huffman","year":"2003","unstructured":"Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Proc. of the 8th International Workshop on Information Hiding","author":"Y. Kim","year":"2006","unstructured":"Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Proc. of the 8th International Workshop on Information Hiding. LNCS, Springer, Heidelberg (2006)"},{"key":"9_CR13","unstructured":"McEliece, R.J.: The Guruswami-Sudan decoding algorithm for Reed- Solomon codes. Technical Report 42-153, IPN Progress Report (May 2003), http:\/\/tmo.jpl.nasa.gov\/progress_report\/42-153\/153F.pdf"},{"issue":"6","key":"9_CR14","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/TIT.1984.1056978","volume":"30","author":"A. McLoughlin","year":"1984","unstructured":"McLoughlin, A.: The complexity of computing the covering radius of a code. IEEE Transactions on Information Theory\u00a030(6), 800\u2013804 (1984)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Advances in Cryptology \u2013 CRYPTO 1983, pp. 51\u201367. Plenum Press (1984)","DOI":"10.1007\/978-1-4684-4730-9_5"},{"issue":"1","key":"9_CR16","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1006\/jcom.1997.0439","volume":"13","author":"M. Sudan","year":"1997","unstructured":"Sudan, M.: Decoding of Reed\u2013Solomon codes beyond the error\u2013correction bound. Journal of Complexity\u00a013(1), 180\u2013193 (1997)","journal-title":"Journal of Complexity"},{"key":"9_CR17","first-page":"214","volume-title":"Proc. of the ACM Multimedia and Security Workshop 2006","author":"D. Sch\u00f6nfeld","year":"2006","unstructured":"Sch\u00f6nfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proc. of the ACM Multimedia and Security Workshop 2006, pp. 214\u2013223. ACM Press, New York (2006)"},{"issue":"6","key":"9_CR18","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.641542","volume":"43","author":"A. Vardy","year":"1997","unstructured":"Vardy, A.: The intractability of computing the minimum distance of a code. IEEE Transactions on Information Theory\u00a043(6), 1757\u20131766 (1997)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5 \u2013 a steganographic algorithm: high capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T09:39:44Z","timestamp":1557135584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}