{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:24:39Z","timestamp":1725585879411},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219832"},{"type":"electronic","value":"9783642219849"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21984-9_41","type":"book-chapter","created":{"date-parts":[[2011,6,17]],"date-time":"2011-06-17T18:10:21Z","timestamp":1308334221000},"page":"485-492","source":"Crossref","is-referenced-by-count":0,"title":["Static Parsing Steganography"],"prefix":"10.1007","author":[{"given":"Hikmat","family":"Farhat","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khalil","family":"Challita","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joseph","family":"Zalaket","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"41_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"41_CR2","volume-title":"Introduction to algorithms","author":"Cormen","year":"2001","unstructured":"Cormen, Leiserson, Rivest, Stein.: Introduction to algorithms, 2nd edn. The MIT press, Cambridge (2001)","edition":"2"},{"key":"41_CR3","unstructured":"Dunbar, B.: A detailed look at steganographic techniques and their use in an open-systems environment. Sans InfoSec Reading Room (2002)"},{"key":"41_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1288869.1288872","volume-title":"Proceedings of the 9th Workshop on Multimedia & Security","author":"J. Fridrich","year":"2007","unstructured":"Fridrich, J., Pevn\u00fd, T., Kodovsk\u00fd, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 3\u201314. ACM, New York (2007)"},{"key":"41_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574931","volume-title":"Algorithms on strings, trees, and sequences","author":"D. Gusfield","year":"1997","unstructured":"Gusfield, D.: Algorithms on strings, trees, and sequences. Cambridge university press, Cambridge (1997)"},{"issue":"10","key":"41_CR6","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"W. Huaiqing","year":"2004","unstructured":"Huaiqing, W., Wang, S.: Cyber warfare: Steganography vs. steganalysis. Communications of the ACM\u00a047(10), 76\u201382 (2004)","journal-title":"Communications of the ACM"},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/12.465263","volume":"4675","author":"M.G.J. Fridrich","year":"2002","unstructured":"Fridrich, M.G.J.: Practical steganalysis of digital images - state of the art. Security and Watermarking of Multimedia Contents IV\u00a04675, 1\u201313 (2002)","journal-title":"Security and Watermarking of Multimedia Contents IV"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Johnson, N., Jajodia, S.: Steganalysis of images created using current steganography software. In: Workshop on Information Hiding (1998)","DOI":"10.1007\/3-540-49380-8_19"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Johnson, N., Jajodia, S.: Steganalysis: The investigation of hidden information. In: Proc. of the 1998 IEEE Information Technology Conference (1998)","DOI":"10.1109\/IT.1998.713394"},{"key":"41_CR10","volume-title":"Information hiding: Techniques for steganography and watermarking","author":"Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, Petitcolas: Information hiding: Techniques for steganography and watermarking. Artech House, Boston (2000)"},{"key":"41_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-540-77370-2_14","volume-title":"Information Hiding","author":"A.D. Ker","year":"2008","unstructured":"Ker, A.D.: A fusion of maximum likelihood and structural steganalysis. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 204\u2013219. Springer, Heidelberg (2008)"},{"key":"41_CR12","unstructured":"Krenn, R.: Steganography and steganalysis. Whitepaper (2004)"},{"key":"41_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-540-77370-2_25","volume-title":"Information Hiding","author":"K. Lee","year":"2008","unstructured":"Lee, K., Westfeld, A., Lee, S.: Generalised category attack\u2014improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 378\u2013391. Springer, Heidelberg (2008)"},{"key":"41_CR14","unstructured":"Lin, E.T., Delp, E.J.: A review of data hiding in digital images. In: Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference (1999)"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M., Shirali-Shahreza, S.: Collage steganography. In: Proceedings of the 5th IEEE\/ACIS International Conference on Computer and Information Science (ICIS 2006), Honolulu, HI, USA, pp. 316\u2013321 (July 2006)","DOI":"10.1109\/ICIS-COMSAR.2006.27"},{"key":"41_CR16","unstructured":"Upham, D.: Steganographic algorithm JSteg, http:\/\/zooid.org\/paul\/crypto\/jsteg"},{"key":"41_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"41_CR18","first-page":"673","volume-title":"Proceedings of the Pattern Recognition, 17th International Conference on (ICPR 2004)","author":"X. Yu","year":"2000","unstructured":"Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in jsteg-like steganography. In: Proceedings of the Pattern Recognition, 17th International Conference on (ICPR 2004), pp. 673\u2013676. IEEE Computer Society, Los Alamitos (2000)"},{"key":"41_CR19","unstructured":"Zahedi Kermani, M.J.Z.: A robust steganography algorithm based on texture similarity using gabor filter. In: IEEE 5th International Symposium on Signal Processing and Information Technology (2005)"},{"key":"41_CR20","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1145\/952532.952595","volume-title":"Proceedings of the 2003 ACM Symposium on Applied Computing, SAC 2003","author":"T. Zhang","year":"2003","unstructured":"Zhang, T., Ping, X.: A fast and effective steganalytic technique against jsteg-like algorithms. In: SAC 2003, pp. 307\u2013311. ACM, New York (2003)"}],"container-title":["Communications in Computer and Information Science","Digital Information and Communication Technology and Its Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21984-9_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T11:25:24Z","timestamp":1637839524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21984-9_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219832","9783642219849"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21984-9_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}