{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:38Z","timestamp":1725562598619},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_9","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T05:14:43Z","timestamp":1281503683000},"page":"118-124","source":"Crossref","is-referenced-by-count":6,"title":["Problems of Modeling in the Analysis of Covert Channels"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Grusho","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nikolai","family":"Grusho","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elena","family":"Timonina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","volume-title":"Information Hiding: Steganography and Watermarking-Attacks and Countermeasures","author":"N.F. Johnson","year":"2000","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, Boston (2000)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security\u00a054(6) (2008)","DOI":"10.1109\/TIT.2008.921684"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/11560326_18","volume-title":"Computer Network Security","author":"A. Grusho","year":"2005","unstructured":"Grusho, A., Kniazev, A., Timonina, E.: Detection of Illegal Information Flow. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, vol.\u00a03685, pp. 235\u2013244. Springer, Heidelberg (2005)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Filler, T., Fridrich, J.: Complete characterization of perfectly secure stego-systems with mutually independent embedding operation. In: Proceedings IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 19\u201324 (2009)","DOI":"10.1109\/ICASSP.2009.4959862"},{"issue":"1","key":"9_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","volume":"192","author":"C. Cachin","year":"2004","unstructured":"Cachin, C.: An information-theoretic model for steganography. Information and Computation\u00a0192(1), 41\u201356 (2004)","journal-title":"Information and Computation"},{"key":"9_CR6","unstructured":"Moulin, P., Wang, Y.: New results on steganographic capacity. In: Proceedings of the Conference on Information Sciences and Systems, CISS, March 17-19 (2004)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Filler, T., Fridrich, J., Ker, A.D.: The square root law of steganographic capacity for Markov covers. In: Delp, E.J., Wong, P.W., Memon, N., Dittmann, J. (eds.) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia, San Jose, CA, vol.\u00a0XI, pp. 18\u201321 (January 2009)","DOI":"10.1117\/12.805911"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: The prisoners problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of Crypto 1983, pp. 51\u201367 (1984)","DOI":"10.1007\/978-1-4684-4730-9_5"},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/dma.1999.9.1.1","volume":"9","author":"A. Grusho","year":"1999","unstructured":"Grusho, A.: On existence of subliminal channels. Discrete Mathematics and Applications\u00a09(2), 1\u20138 (1999)","journal-title":"Discrete Mathematics and Applications"},{"key":"9_CR10","volume-title":"The works on information theory and cybernetics","author":"K. Shannon","year":"1963","unstructured":"Shannon, K.: The works on information theory and cybernetics. Foreign Literature, Moscow (1963) (in Russian)"},{"key":"9_CR11","unstructured":"Bourbaki, N.: Topologie Generale. Science, Moscow (1968) (in Russian)"},{"key":"9_CR12","volume-title":"Theory of probabilities","author":"U.V. Prokhorov","year":"1993","unstructured":"Prokhorov, U.V., Rozanov, U.A.: Theory of probabilities. Science, Moscow (1993) (in Russian)"},{"key":"9_CR13","first-page":"187","volume-title":"Proceedings of Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007","author":"A. Grusho","year":"2007","unstructured":"Grusho, A., Grebnev, N., Timonina, E.: Covert channel invisibility theorem. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) Proceedings of Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, pp. 187\u2013196. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:56:38Z","timestamp":1606168598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}