{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:28:34Z","timestamp":1743107314813,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642106187"},{"type":"electronic","value":"9783642106194"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10619-4_22","type":"book-chapter","created":{"date-parts":[[2009,11,16]],"date-time":"2009-11-16T05:01:57Z","timestamp":1258347717000},"page":"176-187","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Steganography Covert Channel"],"prefix":"10.1007","author":[{"given":"Md","family":"Amiruzzaman","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Peyravi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Abdullah-Al-Wadud","sequence":"additional","affiliation":[]},{"given":"Yoojin","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Fridrich, J., Goljan, M., Hogea, H.: Attacking the Out-Guess. In: Proceedings of the ACM Workshop on Multimedia and Security, pp. 967\u2013982 (2002)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, H.: Steganalysis of JPEG image: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"22_CR4","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323\u2013335 (2001)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"issue":"1","key":"22_CR6","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P. Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics\u00a05(1), 167\u2013190 (2005)","journal-title":"International Journal of Image and Graphics"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-77370-2_2","volume-title":"Information Hiding","author":"K. Solanki","year":"2008","unstructured":"Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 16\u201331. Springer, Heidelberg (2008)"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201375. Springer, Heidelberg (2000)"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5: A steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"}],"container-title":["Communications in Computer and Information Science","Advances in Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10619-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T14:49:22Z","timestamp":1680706162000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-10619-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642106187","9783642106194"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10619-4_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}