{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:41:10Z","timestamp":1751568070907,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642382352"},{"type":"electronic","value":"9783642382369"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38236-9_27","type":"book-chapter","created":{"date-parts":[[2013,4,15]],"date-time":"2013-04-15T02:38:02Z","timestamp":1365993482000},"page":"294-305","source":"Crossref","is-referenced-by-count":2,"title":["Grey-Box Public-Key Steganography"],"prefix":"10.1007","author":[{"given":"Hirotoshi","family":"Takebe","sequence":"first","affiliation":[]},{"given":"Keisuke","family":"Tanaka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"27_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications\u00a016(4), 474\u2013481 (1998)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-540-30576-7_12","volume-title":"Theory of Cryptography","author":"M. Backes","year":"2005","unstructured":"Backes, M., Cachin, C.: Public-Key Steganography with Active Attacks. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 210\u2013226. Springer, Heidelberg (2005)"},{"issue":"1","key":"27_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","volume":"192","author":"C. Cachin","year":"2004","unstructured":"Cachin, C.: An Information-Theoretic Model for Steganography. Information of Computation\u00a0192(1), 41\u201356 (2004)","journal-title":"Information of Computation"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-540-45146-4_33","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"R. Canetti","year":"2003","unstructured":"Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing Chosen-Ciphertext Security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 565\u2013582. Springer, Heidelberg (2003)"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 13\u201325. Springer, Heidelberg (1998)"},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s00145-008-9020-3","volume":"22","author":"N. Dedic","year":"2009","unstructured":"Dedic, N., Itkis, G., Reyzin, L., Russell, S.: Upper and Lower Bounds on Black-Box Steganography. Journal of Cryptology\u00a022(3), 365\u2013394 (2009)","journal-title":"Journal of Cryptology"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/11523468_26","volume-title":"Automata, Languages and Programming","author":"N.J. Hopper","year":"2005","unstructured":"Hopper, N.J.: On Steganographic Chosen Covertext Security. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol.\u00a03580, pp. 311\u2013323. Springer, Heidelberg (2005)"},{"issue":"5","key":"27_CR8","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TC.2008.199","volume":"58","author":"N.J. Hopper","year":"2009","unstructured":"Hopper, N.J., von Ahn, L., Langford, J.: Provably Secure Steganography. IEEE Transactions of Computers\u00a058(5), 662\u2013676 (2009)","journal-title":"IEEE Transactions of Computers"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1007\/11940128_75","volume-title":"Algorithms and Computation","author":"C. Hundt","year":"2006","unstructured":"Hundt, C., Li\u015bkiewicz, M., W\u00f6lfel, U.: Provably Secure Steganography and the Complexity of Sampling. In: Asano, T. (ed.) ISAAC 2006. LNCS, vol.\u00a04288, pp. 754\u2013763. Springer, Heidelberg (2006)"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-28628-8_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"K. Kurosawa","year":"2004","unstructured":"Kurosawa, K., Desmedt, Y.: A New Paradigm of Hybrid Encryption Scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 426\u2013442. Springer, Heidelberg (2004)"},{"key":"27_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-20877-5_38","volume-title":"Theory and Applications of Models of Computation","author":"M. Li\u015bkiewicz","year":"2011","unstructured":"Li\u015bkiewicz, M., Reischuk, R., W\u00f6lfel, U.: Grey-Box Steganography. In: Ogihara, M., Tarui, J. (eds.) TAMC 2011. LNCS, vol.\u00a06648, pp. 390\u2013402. Springer, Heidelberg (2011)"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/11745853_9","volume-title":"Public Key Cryptography - PKC 2006","author":"A. Lysyanskaya","year":"2006","unstructured":"Lysyanskaya, A., Meyerovich, M.: Provably Secure Steganography with Imperfect Sampling. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 123\u2013139. Springer, Heidelberg (2006)"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/10719724_1","volume-title":"Information Hiding","author":"T. Mittelholzer","year":"2000","unstructured":"Mittelholzer, T.: An Information-Theoretic Approach to Steganography and Watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 1\u201316. Springer, Heidelberg (2000)"},{"key":"27_CR14","first-page":"51","volume-title":"CRYPTO 1983","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The Prisoners\u2019 Problem and the Subliminal Channel. In: Chaum, D. (ed.) CRYPTO 1983, pp. 51\u201367. Plenum Press, New York (1984)"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-24676-3_20","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"L. von Ahn","year":"2004","unstructured":"von Ahn, L., Hopper, N.J.: Public-Key Steganography. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 323\u2013341. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Theory and Applications of Models of Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38236-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T14:06:00Z","timestamp":1675778760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38236-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642382352","9783642382369"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38236-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}