{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:15:23Z","timestamp":1773148523489,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540889601","type":"print"},{"value":"9783540889618","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_5","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"60-71","source":"Crossref","is-referenced-by-count":51,"title":["Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes"],"prefix":"10.1007","author":[{"given":"Weiming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shuozhong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Crandall, R.: Some notes on steganography. Posted on steganography mailing list (1998), http:\/\/os.inf.tu-dresden.de\/westfeld\/crandall.pdf"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proceedings of the IEEE Information Theory Workshop 2004, pp. 151\u2013154 (2004)","DOI":"10.1109\/ITW.2003.1216717"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Transactions on Data Hiding and Multimedia Security","author":"J. Bierbrauer","year":"2007","unstructured":"Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Transactions on Data Hiding and Multimedia Security. LNCS. Springer, Heidelberg (to appear, 2007), http:\/\/www.math.mtu.edu\/jbierbra\/"},{"issue":"8","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TCOMM.2002.801488","volume":"50","author":"Y.C. Tseng","year":"2002","unstructured":"Tseng, Y.C., Chen, Y.-Y., Pan, H.-K.: A secure data hiding scheme for binary images. IEEE Transactions on Communications\u00a050(8), 1227\u20131231 (2002)","journal-title":"IEEE Transactions on Communications"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proc. ACM the 8th workshop on Multimedia and Security, pp. 214\u2013223 (2006)","DOI":"10.1145\/1161366.1161405"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1016\/j.sigpro.2006.12.008","volume":"87","author":"C. Munuera","year":"2007","unstructured":"Munuera, C.: Steganography and error-correcting codes. Signal Processing\u00a087, 1528\u20131533 (2007)","journal-title":"Signal Processing"},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"1","author":"J. Fridrich","year":"2006","unstructured":"Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Transactions on Information Security and Forensics\u00a01(3), 390\u2013394 (2006)","journal-title":"IEEE Transactions on Information Security and Forensics"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proc. SPIE Electronic Imaging, vol.\u00a06050 (2007)","DOI":"10.1117\/12.697471"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1109\/TIT.2004.842707","volume":"51","author":"F. Willems","year":"2005","unstructured":"Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Transactions on Information Theory\u00a051(3), 1209\u20131214 (2005)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"5_CR10","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X. Zhang","year":"2006","unstructured":"Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Communications Letters\u00a010(11), 781\u2013783 (2006)","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"5_CR11","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/TIT.2007.892768","volume":"53","author":"J. Fridrich","year":"2007","unstructured":"Fridrich, J., Lison\u011bk, P.: Grid coloring in steganography. IEEE Transactions on Information Theory\u00a053(4), 1547\u20131549 (2007)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"5_CR12","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J. Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letters\u00a013(5), 285\u2013287 (2006)","journal-title":"IEEE Signal Processing Letters"},{"issue":"8","key":"5_CR13","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/LCOMM.2007.070438","volume":"11","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Communications Letters\u00a011(8), 680\u2013682 (2007)","journal-title":"IEEE Communications Letters"},{"issue":"11","key":"5_CR14","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1109\/LSP.2007.903255","volume":"14","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Zhang, X., Wang, S.: A double layered \u201cplus-minus one\u201d data embedding scheme. IEEE Signal Processing Letters\u00a014(11), 848\u2013851 (2007)","journal-title":"IEEE Signal Processing Letters"},{"issue":"10","key":"5_CR15","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on wet paper. IEEE Transactions on Signal Processing\u00a053(10), 3923\u20133935 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/11558859_22","volume-title":"Information Hiding","author":"A.D. Ker","year":"2005","unstructured":"Ker, A.D.: A General Framework for the Structural Steganalysis of LSB Replacement. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 296\u2013311. Springer, Heidelberg (2005)"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10623-007-9135-9","volume":"46","author":"W. Zhang","year":"2008","unstructured":"Zhang, W., Li, S.: A coding problem in steganography. Designs, Codes and Cryptography\u00a046, 67\u201381 (2008)","journal-title":"Designs, Codes and Cryptography"},{"issue":"5","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1109\/TIT.2003.810639","volume":"49","author":"R.J. Barron","year":"2003","unstructured":"Barron, R.J., Chen, B., Wornell, G.W.: The duality between information embedding and source coding with side information and some applications. IEEE Transactions on Information Theory\u00a049(5), 1159\u20131180 (2003)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T19:15:57Z","timestamp":1738437357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}