{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:18:05Z","timestamp":1743110285745,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_9","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T06:04:33Z","timestamp":1229407473000},"page":"99-111","source":"Crossref","is-referenced-by-count":3,"title":["Steganalysis of Multi Bit Plane Image Steganography"],"prefix":"10.1007","author":[{"given":"Johann","family":"Barbier","sequence":"first","affiliation":[]},{"given":"Kichenakoumar","family":"Mayoura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/11922841_6","volume-title":"Digital Watermarking","author":"B. Nguyen","year":"2006","unstructured":"Nguyen, B., Yoon, S., Lee, H.K.: Multi bit plane image steganography. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 61\u201370. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Agaian, S., Rodriguez, B., Perez, J.: Stego sensitivity measure and multibit plane based steganography using different color models. In: Delp, E., Wong, P. (eds.) Proc.Security, Steganography, and Watermarking of Multimedia Contents VIII, February 2006, vol.\u00a06072, pp. 279\u2013290 (2006)","key":"9_CR2","DOI":"10.1117\/12.643691"},{"doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in grayscale and color images. In: Proc. ACM Workshop on Multimedia and Security, Ottawa, Canada, October 2001, pp. 27\u201330 (2001)","key":"9_CR3","DOI":"10.1145\/1232454.1232466"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-36415-3_23","volume-title":"Information Hiding","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 355\u2013372. Springer, Heidelberg (2003)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-30114-1_9","volume-title":"Information Hiding","author":"P. Lu","year":"2004","unstructured":"Lu, P., Luo, X., Tang, Q., Shen, L.: An improved sample pairs method for detection of LSB embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 116\u2013127. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security 1 (2006)","key":"9_CR7","DOI":"10.1109\/TIFS.2005.863485"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-30114-1_8","volume-title":"Information Hiding","author":"A. Ker","year":"2004","unstructured":"Ker, A.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 97\u2013115. Springer, Heidelberg (2004)"},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4304\/jmm.2.2.1-9","volume":"2","author":"J. Barbier","year":"2007","unstructured":"Barbier, J., Filiol, \u00c9., Mayoura, K.: Universal detection of JPEG steganography. Journal of Multimedia\u00a02(2), 1\u20139 (2007)","journal-title":"Journal of Multimedia"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/11922841_21","volume-title":"Digital Watermarking","author":"J. Barbier","year":"2006","unstructured":"Barbier, J., Filiol, \u00c9., Mayoura, K.: Universal JPEG steganalysis in the compressed frequency domain. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 253\u2013267. Springer, Heidelberg (2006)"},{"unstructured":"Saporta, G.: Probabilit\u00e9, Analyse des Donn\u00e9es et Statistiques. Technip (in french) (1990)","key":"9_CR11"},{"key":"9_CR12","series-title":"Advances in Pattern Recognition","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0359-2","volume-title":"Statistical and Neural Classifiers: An Integrated Approach to Design.","author":"S. Raudys","year":"2001","unstructured":"Raudys, S.: Statistical and Neural Classifiers: An Integrated Approach to Design. Advances in Pattern Recognition. Springer, Heidelberg (2001)"},{"issue":"4","key":"9_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J. Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale images. IEEE MultiMedia\u00a08(4), 22\u201328 (2001)","journal-title":"IEEE MultiMedia"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5-a steganographic algorithm. In: Moskowitz, I. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"unstructured":"Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington, DC, USA (2001)","key":"9_CR15"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:57:32Z","timestamp":1558267052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}