{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:06:09Z","timestamp":1773655569179,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642044304","type":"print"},{"value":"9783642044311","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04431-1_4","type":"book-chapter","created":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T10:32:43Z","timestamp":1251801163000},"page":"48-58","source":"Crossref","is-referenced-by-count":47,"title":["Fast BCH Syndrome Coding for Steganography"],"prefix":"10.1007","author":[{"given":"Rongyue","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Vasiliy","family":"Sachnev","sequence":"additional","affiliation":[]},{"given":"Hyoung Joong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TIT.1965.1053825","volume":"11","author":"R.T. Chien","year":"1965","unstructured":"Chien, R.T.: Cyclic decoding produce for the Bose-Chaudhuri-Hocquenghem codes. IEEE Transactions on Information Theory\u00a011, 549\u2013557 (1965)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR2","unstructured":"Crandall, R.: Some notes on steganography, Posted on Steganography Mailing List (1998), http:\/\/os.inf.tu-dresden.de\/~westfeld\/crandall.pdf"},{"issue":"10","key":"4_CR3","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Lison\u0115k, P., Soukal, D.: Writing on wet paper. IEEE Transactions on Signal Processing\u00a053(10), part 2, 3923\u20133935 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/S0019-9958(60)90877-9","volume":"3","author":"D. Gorenstein","year":"1960","unstructured":"Gorenstein, D., Peterson, W.W., Zierler, N.: Two-error correcting Bose-Chaudhuri codes are quasi-perfect. Information and Control\u00a03, 291\u2013294 (1960)","journal-title":"Information and Control"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-74124-4_21","volume-title":"Information Hiding","author":"Y. Kim","year":"2007","unstructured":"Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 314\u2013327. Springer, Heidelberg (2007)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proceedings of the 8th ACM Workshop on Multimedia and Security, pp. 214\u2013223 (2006)","DOI":"10.1145\/1161366.1161405"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-77370-2_10","volume-title":"Information Hiding","author":"D. Sch\u00f6nfeld","year":"2008","unstructured":"Sch\u00f6nfeld, D., Winkler, A.: Reducing the complexity of syndrome coding for embedding. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 145\u2013158. Springer, Heidelberg (2008)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5: A steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"issue":"2","key":"4_CR9","first-page":"70","volume":"33","author":"Z. Zhao","year":"2005","unstructured":"Zhao, Z., Wu, F., Yu, S., Zhou, J.: A lookup table based fast algorithm for finding roots of quadric or cubic polynomials in the GF(2 m ). Journal of Huazhong University of Science and Technology (Nature Science Edition)\u00a033(2), 70\u201372 (2005)","journal-title":"Journal of Huazhong University of Science and Technology (Nature Science Edition)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04431-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T05:23:18Z","timestamp":1558502598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04431-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044304","9783642044311"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04431-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}