{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:03:10Z","timestamp":1743825790680,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322044"},{"type":"electronic","value":"9783642322051"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32205-1_3","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T10:09:01Z","timestamp":1342260541000},"page":"3-15","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Matrix Encoding Scheme for JPEG Steganography"],"prefix":"10.1007","author":[{"given":"Vasily","family":"Sachnev","sequence":"first","affiliation":[]},{"given":"Hyoung Joong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Upham, D.: http:\/\/www.funet.fi\/pub\/crypt\/stegangraphy\/jpeg-jsteg-v4.diff.gz"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Eggers, J., Bauml, R., Girod, B.: A communications approach to steganography. In: Proc. of EI SPIE, San Jose, CA, vol.\u00a04675, pp. 26\u201337 (2002)","DOI":"10.1117\/12.465284"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TIT.1965.1053825","volume":"11","author":"R.T. Chien","year":"1965","unstructured":"Chien, R.T.: Cyclic decoding produce for the Bose-Chaudhuri-Hocquenghem codes. IEEE Transactions on Information Theory\u00a011, 549\u2013557 (1965)","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Minimizing the embedding impact in steganography. In: Proc. of ACM Multimedia and Security Workshop, Geneva, Switzerland, September 26-27, pp. 2\u201310 (2006)","DOI":"10.1145\/1161366.1161369"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proc. EI SPIE, San Jose, CA, vol.\u00a06505, pp. 2\u20133 (2007)","DOI":"10.1117\/12.697471"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography using wet paper codes. In: Proc. of ACM Workshop on Multimedia and Security, Magdeburg, Germany, September 20-21, pp. 4\u201315 (2004)","DOI":"10.1145\/1022431.1022435"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proc. of ACM Workshop on Multimedia and Security, Dallas, Texas, September 20-21, pp. 3\u201315 (2007)","DOI":"10.1145\/1288869.1288872"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s00530-005-0194-3","volume":"11","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbet quantization steganography. ACM Multimedia and Security Journal\u00a011(2), 98\u2013107 (2005)","journal-title":"ACM Multimedia and Security Journal"},{"issue":"1","key":"3_CR10","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TIFS.2005.863487","volume":"1","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Wet paper coding with improved embedding efficiency. IEEE Transactions on Information Security and Forensics\u00a01(1), 102\u2013110 (2005)","journal-title":"IEEE Transactions on Information Security and Forensics"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-74124-4_21","volume-title":"Information Hiding","author":"Y.H. Kim","year":"2007","unstructured":"Kim, Y.H., Duric, Z., Richards, D.: Modified Matrix Encoding Technique for Minimal Distortion Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 314\u2013327. Springer, Heidelberg (2007)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Noda, H., Niimi, M., Kawaguchi, E.: Application of QIM with dead zone for histogram preserving JPEG steeganography. In: Proc. of ICIP, Genova, Italy (2005)","DOI":"10.1109\/ICIP.2005.1530247"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Pevny, T., Fridrich, J.: Multiclass blind steganalysis for JPEG images. In: Proc. of SPIE, San Jose, CA, January 16-19, vol.\u00a06072, pp. 257\u2013269 (2006)","DOI":"10.1117\/12.640943"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. of SPIE, San Jose, CA, vol.\u00a06505, pp. 3\u20134 (2007)","DOI":"10.1117\/12.696774"},{"key":"3_CR15","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proc. of 10th USENIX Security Symposium, pp. 24\u201324 (2001)"},{"key":"3_CR16","unstructured":"Sachnev, V., Kim, H.J., Zhang, R., Choi, Y.S.: A novel approach for JPEG steganography. In: Proc. of 7nd International Workshop on Digital Watermarking 2008, Busan, Korea, November 10-12, pp. 216\u2013226 (2008)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Sachnev, V., Kim, H.J., Zhang, R.: Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proc. of ACM Workshop on Multimedia and Security, Princeton, NJ, September 7 - 8, pp. 131\u2013139 (2009)","DOI":"10.1145\/1597817.1597841"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-Based Steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Schnfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proc. of ACM Workshop on Multimedia and Security, pp. 214\u2013223 (2006)","DOI":"10.1145\/1161366.1161405"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-77370-2_10","volume-title":"Information Hiding","author":"D. Sch\u00f6nfeld","year":"2008","unstructured":"Sch\u00f6nfeld, D., Winkler, A.: Reducing the Complexity of Syndrome Coding for Embedding. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 145\u2013158. Springer, Heidelberg (2008)"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-77370-2_2","volume-title":"Information Hiding","author":"K. Solanki","year":"2008","unstructured":"Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 16\u201331. Springer, Heidelberg (2008)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"3_CR23","unstructured":"Zhao, Z., Wu, F., Yu, S., Zhou, J.: A lookup table based fast algorithm for finding roots of quadratic or cubic polynomials in the GF(2 m ). Journal of Huazhong University of Science and Technology (Nature Science Edition)\u00a033(1) (2005)"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-04431-1_4","volume-title":"Information Hiding","author":"R. Zhang","year":"2009","unstructured":"Zhang, R., Sachnev, V., Kim, H.J.: Fast BCH Syndrome Coding for Steganography. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol.\u00a05806, pp. 48\u201358. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32205-1_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:27:14Z","timestamp":1743740834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32205-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322044","9783642322051"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32205-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}