{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:01:04Z","timestamp":1760346064204,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_11","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"127-142","source":"Crossref","is-referenced-by-count":11,"title":["Weaknesses of MB2"],"prefix":"10.1007","author":[{"given":"Christian","family":"Ullerich","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Westfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents V (Proc. of SPIE), San Jose, CA, vol.\u00a05020, pp. 178\u2013190 (2003)","DOI":"10.1117\/12.473140"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VI (Proc. of SPIE), San Jose, CA, vol.\u00a05306, pp. 23\u201334 (2004)","DOI":"10.1117\/12.521350"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans.\u00a0of Signal Processing\u00a051, 1995\u20132007 (2003)","journal-title":"IEEE Trans.\u00a0of Signal Processing"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in Jsteg-like steganography. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), pp. 673\u2013676 (2004)","DOI":"10.1109\/ICPR.2004.1333862"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1145\/952532.952595","volume-title":"Proceedings of the 2003 ACM Symposium on Applied Computing (SAC 2003)","author":"T. Zhang","year":"2003","unstructured":"Zhang, T., Ping, X.: A fast and effective steganalytic technique against Jsteg-like algorithms. In: Proceedings of the 2003 ACM Symposium on Applied Computing (SAC 2003), Melbourne, Florida, USA, March 9-12, 2003, pp. 307\u2013311. ACM Press, New York (2003)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11922841_4","volume-title":"Digital Watermarking","author":"K. Lee","year":"2006","unstructured":"Lee, K., Westfeld, A., Lee, S.: Category Attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 35\u201348. Springer, Heidelberg (2006)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-540-77370-2_25","volume-title":"Information Hiding","author":"K. Lee","year":"2008","unstructured":"Lee, K., Westfeld, A., Lee, S.: Generalised Category Attack\u2014improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 378\u2013391. Springer, Heidelberg (2008)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Ro, Y.M., Cox, I.J. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-30108-0_8","volume-title":"Computer Security \u2013 ESORICS 2004","author":"R. B\u00f6hme","year":"2004","unstructured":"B\u00f6hme, R., Westfeld, A.: Breaking Cauchy model-based JPEG steganography with first order statistics. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 125\u2013140. Springer, Heidelberg (2004)"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P. Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics\u00a05(1), 167\u2013190 (2005)","journal-title":"International Journal of Image and Graphics"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich, J.J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: [18], pp. 67\u201381","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-74124-4_17","volume-title":"Information Hiding","author":"Y.Q. Shi","year":"2007","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp, E.J., Wong, P.W. (eds.) SPIE 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of the SPIE, San Jos\u00e9, January 2007, vol.\u00a06505, p. 650503 (2007)","DOI":"10.1117\/12.696774"},{"key":"11_CR14","first-page":"208","volume-title":"MM&Sec 2006: Proceeding of the 8th Workshop on Multimedia and Security","author":"A. Westfeld","year":"2006","unstructured":"Westfeld, A.: Lessons from the BOWS contest. In: MM&Sec 2006: Proceeding of the 8th Workshop on Multimedia and Security, pp. 208\u2013213. ACM Press, New York (2006)"},{"key":"11_CR15","unstructured":"ECRYPT: BOWS, Break our watermarking system (2006), http:\/\/lci.det.unifi.it\/BOWS"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: [18], pp. 97\u2013115","DOI":"10.1007\/978-3-540-30114-1_8"},{"key":"11_CR17","first-page":"967","volume-title":"Proc. of ACM Multimedia and Security Workshop 2002, MM&Sec06","author":"J.J. Fridrich","year":"2002","unstructured":"Fridrich, J.J., Goljan, M., Hogea, D.: Attacking the Outguess. In: Proc. of ACM Multimedia and Security Workshop 2002, MM&Sec06, Juan-les-Pins, France, pp. 967\u2013982. ACM Press, New York (2002)"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","year":"2004","unstructured":"Fridrich, J.J. (ed.): IH 2004. LNCS, vol.\u00a03200. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:57:34Z","timestamp":1738821454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}