{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:50Z","timestamp":1725538910008},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_25","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T07:17:59Z","timestamp":1254208679000},"page":"293-302","source":"Crossref","is-referenced-by-count":1,"title":["Detection of Hidden Information in Webpage Based on Higher-Order Statistics"],"prefix":"10.1007","author":[{"given":"Huajun","family":"Huang","sequence":"first","affiliation":[]},{"given":"Junshan","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Xingming","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lingxi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"25_CR1","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1360\/crad20070504","volume":"44","author":"X.M. Sun","year":"2007","unstructured":"Sun, X.M., Huang, H.J., Wang, B.W.: An Algorithm of Webpage Information Hiding Based on Equal Tag. Journal of Computer Research and Development\u00a044(5), 756\u2013760 (2007)","journal-title":"Journal of Computer Research and Development"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1016\/j.patcog.2006.04.047","volume":"40","author":"Q.J. Zhao","year":"2007","unstructured":"Zhao, Q.J., Lu, H.T.: PCA-Based Web page Watermarking. Journal of the Pattern Recognition\u00a040, 1334\u20131341 (2007)","journal-title":"Journal of the Pattern Recognition"},{"key":"25_CR3","first-page":"217","volume":"50","author":"Y. Shen","year":"2004","unstructured":"Shen, Y.: A Scheme of Information Hiding Based on HTML Document. Journal of Wuhan University\u00a050, 217\u2013220 (2004)","journal-title":"Journal of Wuhan University"},{"key":"25_CR4","first-page":"181","volume-title":"Proc. of Asia-Pacific Radio Science Conference, Taiwan","author":"X.G. Sui","year":"2004","unstructured":"Sui, X.G., Luo, H.: A New Steganography Method Based on Hypertext. In: Proc. of Asia-Pacific Radio Science Conference, Taiwan, pp. 181\u2013184. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Taskiran, C.M., Topkara, U., Topkara, M.: Attacks on Lexical Natural Language Steganography Systems. In: Proceedings of the SPIE, pp. 97\u2013105 (2006)","DOI":"10.1117\/12.649551"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"4405","DOI":"10.1109\/ISCAS.2005.1465608","volume-title":"Proceedings of 2005 IEEE International Symposium on Circuits and Systems","author":"J. Cheng","year":"2005","unstructured":"Cheng, J., Alex, C.K., Liu, J.L.: Steganalysis of Data Hiding in Binary Text Images. In: Proceedings of 2005 IEEE International Symposium on Circuits and Systems, Kobe, pp. 4405\u20134408. IEEE Computer Society Press, Los Alamitos (2005)"},{"issue":"6","key":"25_CR7","first-page":"181","volume":"32","author":"G. Luo","year":"2005","unstructured":"Luo, G., Sun, X.M., Liu, Y.L.: Research on steganalysis of stegotext based on noise detecting. Journal of Hunan University\u00a032(6), 181\u2013184 (2005)","journal-title":"Journal of Hunan University"},{"key":"25_CR8","first-page":"54","volume-title":"Proc. of the 2006 International of Communications, Circuits and Systems","author":"X.G. Sui","year":"2006","unstructured":"Sui, X.G., Luo, H.: A Steganalysis Method Based on the Distribution of Space Characters. In: Proc. of the 2006 International of Communications, Circuits and Systems, Guilin, pp. 54\u201356. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"25_CR9","first-page":"369","volume-title":"Proc. of the 2006 International on Intelligent Information Hiding and Multimedia Signal, California","author":"X.G. Liu","year":"2006","unstructured":"Liu, X.G., Luo, H., Zhu, Z.L.: A Steganalysis Method Based on the Distribution of First Letters of Words. In: Proc. of the 2006 International on Intelligent Information Hiding and Multimedia Signal, California, pp. 369\u2013372. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"25_CR10","first-page":"257","volume-title":"Proc. of the 2006 International on Intelligent Information Hiding and Multimedia Signal","author":"H.J. Huang","year":"2007","unstructured":"Huang, H.J., Sun, X.M., Sun, G.: Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch. In: Proc. of the 2006 International on Intelligent Information Hiding and Multimedia Signal, Haikou, pp. 257\u2013260. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"25_CR11","first-page":"317","volume-title":"Proc. of the 4th International Conference on Fuzzy Systems and Knowledge Discovery","author":"H.J. Huang","year":"2007","unstructured":"Huang, H.J., Sun, X.M., Li, Z.S.: Detection of Hidden Information in Webpage. In: Proc. of the 4th International Conference on Fuzzy Systems and Knowledge Discovery, Kaoxiong, pp. 317\u2013320. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/IAS.2007.74","volume-title":"Proc. of The Third International Symposium on Information Assurance and Security, Manchester","author":"J.W. Huang","year":"2007","unstructured":"Huang, J.W., Sun, X.M., Huang, H.J.: Detection of Hiding Information in Webpages Based on Randomness. In: Proc. of The Third International Symposium on Information Assurance and Security, Manchester, pp. 447\u2013452. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"25_CR13","first-page":"27","volume-title":"Proc. of the ACM Workshop on Multimedia and Security, Ottawa","author":"J. Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in grayscale and color images. In: Dittmann, J., Nahrstedt, K., et al. (eds.) Proc. of the ACM Workshop on Multimedia and Security, Ottawa, pp. 27\u201330. ACM Press, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T19:59:23Z","timestamp":1552161563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}