{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:06:24Z","timestamp":1773655584814,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540889601","type":"print"},{"value":"9783540889618","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_13","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"178-194","source":"Crossref","is-referenced-by-count":26,"title":["Weighted Stego-Image Steganalysis for JPEG Covers"],"prefix":"10.1007","author":[{"given":"Rainer","family":"B\u00f6hme","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VI (Proc. of SPIE), San Jose, CA (2004)","DOI":"10.1117\/12.521350"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Ker, A.D., B\u00f6hme, R.: Revisiting weighted stego-image steganalysis. In: Delp, E.J., et al. (eds.) Security, Forensics, Steganography and Watermarking of Multimedia Contents X (Proc. of SPIE), San Jose, CA, vol.\u00a06819 (2008)","DOI":"10.1117\/12.766820"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/11558859_22","volume-title":"Information Hiding","author":"A.D. Ker","year":"2005","unstructured":"Ker, A.D.: A general framework for the structural steganalysis of LSB replacement. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 296\u2013311. Springer, Heidelberg (2005)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, R., Ker, A.D.: A two-factor error model for quantitative steganalysis. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VIII (Proc. of SPIE), San Jose, CA, vol.\u00a06072, pp. 59\u201374 (2006)","DOI":"10.1117\/12.643701"},{"key":"13_CR5","unstructured":"Upham, D.: JSteg, Version 4 (1992), http:\/\/zooid.org\/~paul\/crypto\/jsteg\/"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/11558859_21","volume-title":"Information Hiding","author":"R. B\u00f6hme","year":"2005","unstructured":"B\u00f6hme, R.: Assessment of steganalytic methods using multiple regression models. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 278\u2013295. Springer, Heidelberg (2005)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. on Signal Processing\u00a051, 1995\u20132007 (2003)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Steganalysis based on JPEG compatibility. In: Tescher, A.G., Vasudev, B., Bove Jr., V.M. (eds.) Multimedia Systems and Applications IV (Proc. of SPIE), Denver, CO, pp. 275\u2013280 (2001)","DOI":"10.1117\/12.448213"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"13_CR10","first-page":"307","volume-title":"Proc. of ACM Symposium on Applied Computing","author":"T. Zhang","year":"2003","unstructured":"Zhang, T., Ping, X.: A fast and effective steganalytic technique against JSteg-like algorithms. In: Proc. of ACM Symposium on Applied Computing, Melbourne, Florida, pp. 307\u2013311. ACM Press, New York (2003)"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11922841_4","volume-title":"Digital Watermarking","author":"K. Lee","year":"2006","unstructured":"Lee, K., Westfeld, A., Lee, S.: Category attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 35\u201348. Springer, Heidelberg (2006)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-540-77370-2_25","volume-title":"Information Hiding","author":"K. Lee","year":"2008","unstructured":"Lee, K., Westfeld, A., Lee, S.: Generalised category attack \u2013 improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 378\u2013391. Springer, Heidelberg (2008)"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TIFS.2007.897265","volume":"2","author":"A.D. Ker","year":"2007","unstructured":"Ker, A.D.: Derivation of error distribution in least squares steganalysis. IEEE Trans. on Information Forensics and Security\u00a02, 140\u2013148 (2007)","journal-title":"IEEE Trans. on Information Forensics and Security"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T17:06:59Z","timestamp":1557853619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}