{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:45:08Z","timestamp":1761662708551},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_17","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"236-250","source":"Crossref","is-referenced-by-count":15,"title":["A Data Mapping Method for Steganography and Its Application to Images"],"prefix":"10.1007","author":[{"given":"Hao-tian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[]},{"given":"Yiu-ming","family":"Cheung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"17_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal on Selected Areas in Communications\u00a016(4), 474\u2013481 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology: Proceedings of CRYPTO 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The prisoner\u2019s problem and the subliminal channel. In: Advances in Cryptology: Proceedings of CRYPTO 1983, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An information theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-49380-8_19","volume-title":"Information Hiding","author":"N.F. Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 273\u2013289. Springer, Heidelberg (1998)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Wang, Y., Moulin, P.: Steganalysis of block-structured stegotext. In: Proceedings of the SPIE Electronic Imaging, San Jose, CA, vol.\u00a05306, pp. 477\u2013488 (January 2004)","DOI":"10.1117\/12.527745"},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/TIFS.2006.873595","volume":"1","author":"K. Sullivan","year":"2006","unstructured":"Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Steganalysis for Markov Cover Data with Applications to Images. IEEE Transactions on Information Forensics and Security\u00a01(2), 275\u2013287 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"key":"17_CR9","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proceedings of the ACM Workshop on Multimedia and Security, Juan-Pins, France, December 2002, pp. 967\u2013982 (2002)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-540-30114-1_7","volume-title":"Information Hiding","author":"R. Bohme","year":"2004","unstructured":"Bohme, R., Westfeld, A.: Exploiting preserved statistics for steganalysis. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 82\u201396. Springer, Heidelberg (2004)"},{"issue":"7","key":"17_CR11","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processingy\u00a051(7), 1995\u20132007 (2003)","journal-title":"IEEE Transactions on Signal Processingy"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Steganalysis using color wavelet statistics and one-class support vector machines. In: Proceedings of the SPIE Electronic Imaging, San Jose, CA, vol.\u00a05306, pp. 35\u201345 (January 2004)","DOI":"10.1117\/12.526012"},{"issue":"6","key":"17_CR13","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"A.D. Ker","year":"2005","unstructured":"Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters\u00a012(6), 441\u2013444 (2005)","journal-title":"IEEE Signal Processing Letters"},{"issue":"2","key":"17_CR14","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I. Avcibas","year":"2003","unstructured":"Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE Transactions on Image Processing\u00a012(2), 221\u2013229 (2003)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TIFS.2005.863485","volume":"1","author":"S. Lyu","year":"2006","unstructured":"Lyu, S., Farid, H.: Steganalysis using high-order image statistics. IEEE Transactions on Information Forensics and Security\u00a01(1), 111\u2013119 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TIFS.2006.890517","volume":"2","author":"Y. Wang","year":"2007","unstructured":"Wang, Y., Moulin, P.: Optimized feature extraction for learning-based image steganalysis. IEEE Transactions on Information Forensics and Security\u00a02(1), 31\u201345 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: High capacity despite better steganalysis (F5 - a steganographic algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"17_CR18","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th USENIX Security Symposium, Washington, DC, pp. 323\u2013335 (2001)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-36415-3_18","volume-title":"Information Hiding","author":"E. Franz","year":"2003","unstructured":"Franz, E.: Steganography preserving statistical properties. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 278\u2013294. Springer, Heidelberg (2003)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Eggers, J.J., Bauml, R., Girod, B.: A communications approach to image steganography. In: Proceedings of the SPIE Electronic Imaging, San Jose, CA, vol.\u00a04675, pp. 26\u201337 (2002)","DOI":"10.1117\/12.465284"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Tzschoppe, R., Bauml, R., Huber, J.B., Kaup, A.: Steganographic system based on higher-order statistics. In: Proceedings of the SPIE Electronic Imaging, San Jose, CA, vol.\u00a05020, pp. 156\u2013166 (January 2003)","DOI":"10.1117\/12.477301"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Provably secure steganography: Achieving zero K-L divergence using statistical restoration. In: IEEE International Conference on Image Processing 2006, Atlanta, USA, pp. 125\u2013128 (Octobor 2006)","DOI":"10.1109\/ICIP.2006.312388"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Sarkar, A., Solanki, K., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Secure steganography: Statistical restoration of the second order dependencies for improved security. In: Proceedings of the 32th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Honolulu, Hawaii (April 2007)","DOI":"10.1109\/ICASSP.2007.366226"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based Steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"17_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-30108-0_8","volume-title":"Computer Security \u2013 ESORICS 2004","author":"R. Bohme","year":"2004","unstructured":"Bohme, R., Westfeld, A.: Breaking Cauchy Model-based JPEG Steganography with First Order Statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 125\u2013140. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T17:07:06Z","timestamp":1557853626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}