{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T19:40:03Z","timestamp":1738438803680,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_12","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"161-177","source":"Crossref","is-referenced-by-count":5,"title":["Generic Adoption of Spatial Steganalysis to Transformed Domain"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Westfeld","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"12_CR2","unstructured":"Upham, D.: Jsteg (1993), http:\/\/www.nic.funet.fi\/pub\/crypt\/steganography\/jpeg-jsteg-v4.diff.gz"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1016\/S0165-1684(03)00169-5","volume":"83","author":"T. Zhang","year":"2003","unstructured":"Zhang, T., Ping, X.: A new approach to reliable detection of LSB steganography in natural images. Signal Processing\u00a083, 2085\u20132093 (2003)","journal-title":"Signal Processing"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in Jsteg-like steganography. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), pp. 673\u2013676 (2004)","DOI":"10.1109\/ICPR.2004.1333862"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11922841_4","volume-title":"Digital Watermarking","author":"K. Lee","year":"2006","unstructured":"Lee, K., Westfeld, A., Lee, S.: Category Attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 35\u201348. Springer, Heidelberg (2006)"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-540-77370-2_25","volume-title":"Information Hiding","author":"K. Lee","year":"2008","unstructured":"Lee, K., Westfeld, A., Lee, S.: Generalised Category Attack\u2014improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 378\u2013391. Springer, Heidelberg (2008)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-74124-4_17","volume-title":"Information Hiding","author":"Y.Q. Shi","year":"2007","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents IX (Proc. of SPIE), San Jose, CA (2007)","DOI":"10.1117\/12.696774"},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J. Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Multimedia\u00a08(4), 22\u201328 (2001)","journal-title":"IEEE Multimedia"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VI (Proc. of SPIE), San Jose, CA (2004)","DOI":"10.1117\/12.521350"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-36415-3_23","volume-title":"Information Hiding","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 355\u2013372. Springer, Heidelberg (2003)"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. of Signal Processing\u00a051, 1995\u20132007 (2003)","journal-title":"IEEE Trans. of Signal Processing"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents V (Proc. of SPIE), San Jose, CA, pp. 178\u2013190 (2003)","DOI":"10.1117\/12.473140"},{"key":"12_CR15","unstructured":"Latham, A.: JPhide and JPseek (1998), http:\/\/packetstormsecurity.org\/crypt\/stego\/jphs\/"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: Space filling curves in steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VII (Proc. of SPIE), San Jose, CA, pp. 28\u201337 (2005)","DOI":"10.1117\/12.587280"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TIP.2002.804279","volume":"11","author":"C. Tu","year":"2002","unstructured":"Tu, C., Tran, T.D.: Context-based entropy coding of block transform coefficients for image compression. IEEE Transactions on Image Processing\u00a011, 1271\u20131283 (2002)","journal-title":"IEEE Transactions on Image Processing"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Deever, A., Hemami, S.S.: What\u2019s your sign? Efficient sign coding for embedded wavelet image coding. In: Data Compression Conference, pp. 273\u2013282 (2000)","DOI":"10.1109\/DCC.2000.838167"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2014a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"12_CR20","unstructured":"Provos, N.: Outguess (2001), http:\/\/www.outguess.org"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Zou, D., Xuan, G.: JPEG steganalysis using empirical transition matrix in block DCT domain. In: IEEE 8th Workshop on Multimedia Signal Processing, pp. 310\u2013313 (2002)","DOI":"10.1109\/MMSP.2006.285320"},{"key":"12_CR23","unstructured":"NRCS: Photo gallery of the USDA Natural Resources Conservation Service (2006), http:\/\/photogallery.nrcs.usda.gov\/"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, R., Ker, A.D.: A two-factor error model for quantitative steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VIII (Proc. of SPIE), San Jose, CA, vol.\u00a06072, pp. 59\u201374 (2006)","DOI":"10.1117\/12.643701"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T19:16:09Z","timestamp":1738437369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}