{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:51:36Z","timestamp":1725742296310},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400988"},{"type":"electronic","value":"9783642400995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40099-5_7","type":"book-chapter","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T12:32:17Z","timestamp":1374669137000},"page":"69-82","source":"Crossref","is-referenced-by-count":0,"title":["An Attempt to Generalize Distortion Measure for JPEG Steganography"],"prefix":"10.1007","author":[{"given":"Vasily","family":"Sachnev","sequence":"first","affiliation":[]},{"given":"Hyoung Joong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings of the IEEE Internernational Symposium on Circuits and Systems, pp. 3029\u20133032 (2008)","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TIT.1965.1053825","volume":"11","author":"R.T. Chien","year":"1965","unstructured":"Chien, R.T.: Cyclic decoding produce for the Bose-Chaudhuri-Hocquenghem codes. IEEE Transactions on Information Theory\u00a011, 549\u2013557 (1965)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Eggers, J., Bauml, R., Girod, B.: A communications approach to image steganography. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 26\u201337 (2002)","DOI":"10.1117\/12.465284"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Filler, T., Fridrich, J.: Steganography using Gibbs random fields. In: Proceedings of ACM Multimedia and Security Workshop, pp. 199\u2013212 (2010)","DOI":"10.1145\/1854229.1854266"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of SPIE, vol.\u00a07541, pp. 1\u201314 (2010)","DOI":"10.1117\/12.838002"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Minimizing the embedding impact in steganography. In: Proceedings of ACM Multimedia and Security Workshop, pp. 2\u201310 (2006)","DOI":"10.1145\/1161366.1161369"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proceedings of SPIE, vol.\u00a06505, pp. 2\u20133 (2007)","DOI":"10.1117\/12.697471"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography using wet paper codes. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 4\u201315 (2004)","DOI":"10.1145\/1022431.1022435"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s00530-005-0194-3","volume":"11","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography. ACM Multimedia and Security Journal\u00a011(2), 98\u2013107 (2005)","journal-title":"ACM Multimedia and Security Journal"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 3\u201315 (2007)","DOI":"10.1145\/1288869.1288872"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TIFS.2005.863487","volume":"1","author":"J. Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Wet paper coding with improved embedding efficiency. IEEE Transactions on Information Security and Forensics\u00a01(1), 102\u2013110 (2005)","journal-title":"IEEE Transactions on Information Security and Forensics"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-74124-4_21","volume-title":"Information Hiding","author":"Y.H. Kim","year":"2007","unstructured":"Kim, Y.H., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 314\u2013327. Springer, Heidelberg (2007)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kodovsky, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Craver, S., Fridrich, J. (eds.) Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, September 7-8 (2009)","DOI":"10.1145\/1597817.1597830"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Kodovsk, J., Fridrich, J.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, San Francisco, CA, January 23-26 (2011)","DOI":"10.1117\/12.872279"},{"key":"7_CR16","unstructured":"Lin, S., Costello, D.J.: Error Control Coding, 2nd edn. Prentice-Hall (2004)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Noda, H., Niimi, M., Kawaguchi, E.: Application of QIM with dead zone for histogram preserving JPEG steeganography. In: Proceedings of Initernational Conference on Image Processing, vol.\u00a0II, pp. 1082\u20131085 (2005)","DOI":"10.1109\/ICIP.2005.1530247"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Pevny, T., Fridrich, J.: Multiclass blind steganalysis for JPEG images. In: Proceedings of SPIE, vol.\u00a06072, pp. 257\u2013269 (2006)","DOI":"10.1117\/12.640943"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, San Jose, CA, vol.\u00a06505, pp. 311\u2013314 (2007)","DOI":"10.1117\/12.696774"},{"key":"7_CR20","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proceedings of 10th USENIX Security Symposium, Washington, DC, pp. 24\u201324 (2001)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-04438-0_18","volume-title":"Digital Watermarking","author":"V. Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Zhang, R., Choi, Y.S.: A novel approach for JPEG steganography. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol.\u00a05450, pp. 209\u2013217. Springer, Heidelberg (2009)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Sachnev, V., Kim, H.J., Zhang, R.: Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 131\u2013139 (2009)","DOI":"10.1145\/1597817.1597841"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Sch\u00f6feld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 214\u2013223 (2006)","DOI":"10.1145\/1161366.1161405"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-77370-2_10","volume-title":"Information Hiding","author":"D. Sch\u00f6nfeld","year":"2008","unstructured":"Sch\u00f6nfeld, D., Winkler, A.: Reducing the complexity of syndrome coding for embedding. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 145\u2013158. Springer, Heidelberg (2008)"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-74124-4_17","volume-title":"Information Hiding","author":"Y.Q. Shi","year":"2007","unstructured":"Shi, Y.Q., Chen, C.-H., Chen, W.: A markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-77370-2_2","volume-title":"Information Hiding","author":"K. Solanki","year":"2008","unstructured":"Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 16\u201331. Springer, Heidelberg (2008)"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2013A steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"7_CR29","unstructured":"Zhao, Z., Wu, F., Yu, S., Zhou, J.: A lookup table based fast algorithm for finding roots of quadratic or cubic polynomials in the GF(2m). Journal of Huazhong University of Science and Technology (Nature Science Edition)\u00a033, xx-xx (2005)"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-04431-1_4","volume-title":"Information Hiding","author":"R. Zhang","year":"2009","unstructured":"Zhang, R., Sachnev, V., Kim, H.J.: Fast BCH syndrome coding for steganography. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol.\u00a05806, pp. 48\u201358. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermaking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40099-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T03:10:33Z","timestamp":1563505833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40099-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400988","9783642400995"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40099-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}