{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:44Z","timestamp":1725538904035},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_19","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T07:17:59Z","timestamp":1254208679000},"page":"218-228","source":"Crossref","is-referenced-by-count":0,"title":["A High Capacity Steganographic Algorithm in Color Images"],"prefix":"10.1007","author":[{"given":"Ting","family":"Li","sequence":"first","affiliation":[]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Rongrong","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Lifang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"19_CR1","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.patrec.2005.09.008","volume":"27","author":"H. Noda","year":"2006","unstructured":"Noda, H., Niimi, M., Kawaguchi, E.: High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters\u00a027(5), 455\u2013461 (2006)","journal-title":"Pattern Recognition Letters"},{"key":"19_CR2","unstructured":"Upham, D.: (1997), \n                  \n                    http:\/\/ftp.funet.fi\/pub\/crypt\/cypherpunks\/steganography\/jsteg\/"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5-A steganographic algorithm: high capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"19_CR4","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323\u2013336 (2001)"},{"issue":"1","key":"19_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P. Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics\u00a05(1), 167\u2013190 (2005)","journal-title":"International Journal of Image and Graphics"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1016\/j.sigpro.2006.10.014","volume":"87","author":"K. Wong","year":"2007","unstructured":"Wong, K., Qi, X., Tanaka, K.: A DCT-Based Mod4 Steganographic Method. Signal Processing\u00a087, 1251\u20131263 (2007)","journal-title":"Signal Processing"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-77370-2_2","volume-title":"Information Hiding","author":"K. Solanki","year":"2008","unstructured":"Solanki, K., Sarkar, A., Manjunath, B.S.: YASS:Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 16\u201331. Springer, Heidelberg (2008)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-74124-4_17","volume-title":"Information Hiding","author":"Y.Q. Shi","year":"2007","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. of SPIE, San Jose, CA (2007)","DOI":"10.1117\/12.696774"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"issue":"4","key":"19_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J. Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale images. IEEE Multimedia\u00a08(4), 22\u201328 (2001)","journal-title":"IEEE Multimedia"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"F. Petitcolas","year":"1998","unstructured":"Petitcolas, F., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 219\u2013239. Springer, Heidelberg (1998), \n                  \n                    http:\/\/www.cl.cam.ac.uk\/~fapp2\/papers\/ih98-attacks\/"},{"key":"19_CR13","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proceedings ACM Workshop on Multimedia and Security 2002, France, pp. 3\u20136 (2002)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T19:33:49Z","timestamp":1552160029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}