{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:52:23Z","timestamp":1725537143858},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044304"},{"type":"electronic","value":"9783642044311"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04431-1_1","type":"book-chapter","created":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T14:32:43Z","timestamp":1251815563000},"page":"1-14","source":"Crossref","is-referenced-by-count":0,"title":["Supraliminal Audio Steganography: Audio Files Tricking Audiophiles"],"prefix":"10.1007","author":[{"given":"Heather","family":"Crawford","sequence":"first","affiliation":[]},{"given":"John","family":"Aycock","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","first-page":"51","volume-title":"Advances in Cryptology, Proceedings of CRYPTO 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The Prisoners\u2019 Problem and the Subliminal Channel. In: Chaum, D. (ed.) Advances in Cryptology 1981 - 1997, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"1_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4375-6","volume-title":"Information Hiding: Steganography and Watermarking - Attacks and Countermeasures","author":"N.F. Johnson","year":"2001","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking - Attacks and Countermeasures. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-49380-8_25","volume-title":"Information Hiding","author":"S. Craver","year":"1998","unstructured":"Craver, S.: On Public-Key Steganography in the Presence of an Active Warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 355\u2013368. Springer, Heidelberg (1998)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-88961-8_20","volume-title":"Information Hiding","author":"S. Craver","year":"2008","unstructured":"Craver, S., Li, E., Yu, J., Atakli, I.: A Supraliminal Channel in a Videoconferencing Application. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol.\u00a05284, pp. 283\u2013293. Springer, Heidelberg (2008)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-74124-4_8","volume-title":"Information Hiding","author":"R. Bergmair","year":"2007","unstructured":"Bergmair, R., Katzenbeisser, S.: Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 109\u2013123. Springer, Heidelberg (2007)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Cvejic, N., Seppanen, T.: Increasing the Capacity of LSB-based Audio Steganography. In: Proceedings of 2002 IEEE Workshop on Multimedia Signal Processing, pp. 336\u2013338 (2002)","DOI":"10.1109\/MMSP.2002.1203314"},{"key":"1_CR7","first-page":"194","volume-title":"Proceedings of SPIE Security and Watermarking of Multimedia","author":"D. Inoue","year":"2002","unstructured":"Inoue, D., Matsumoto, T.: A Scheme of Standard MIDI Files Steganography and Its Evaluation. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of SPIE Security and Watermarking of Multimedia, vol.\u00a04675, pp. 194\u2013205. SPIE, San Jose (2002)"},{"key":"1_CR8","first-page":"2401","volume-title":"Proceedings of the Fourth International Conference on Machine Learning and Cybernetics","author":"A. Adli","year":"2005","unstructured":"Adli, A., Nakao, Z.: Three Steganography Algorithms for MIDI Files. In: Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, vol.\u00a04, pp. 2401\u20132404. IEEE, Los Alamitos (2005)"},{"key":"1_CR9","unstructured":"TeraMedia: soundsnap.com: High-quality sound effects and loops. Webpage (2008)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Josefsson, S.: Base16, Base32, and Base64 Encoding: Request for Comments 3548, Network Working Group (July 2003), http:\/\/www.faqs.org\/rfcs\/rfc3548.html (last checked January 16, 2009)","DOI":"10.17487\/rfc3548"},{"key":"1_CR11","unstructured":"Mazzoni, D.: Audacity: Free Audio Editor and Recorder (January 2009), http:\/\/audacity.sourceforge.net\/ (last checked January 16, 2009)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/ICASSP.2005.1415403","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2005","author":"T.T. Lam","year":"2005","unstructured":"Lam, T.T., Karam, L.J., Bazzi, R.A., Aboudsleman, G.P.: Reduced-Delay Selective ARQ for Low Bit-Rate Image and Multimedia Data Transmission. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2005, vol.\u00a02, pp. 309\u2013312. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"1_CR13","first-page":"410","volume-title":"Proceedings of the Third International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN)","author":"D. Bhattacharrya","year":"1997","unstructured":"Bhattacharrya, D., Nandi, S.: An Efficient Class of SEC-DED-AUED Codes. In: Proceedings of the Third International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), pp. 410\u2013416. IEEE Computer Society, Los Alamitos (1997)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04431-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T09:23:28Z","timestamp":1558517008000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04431-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044304","9783642044311"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04431-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}