{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:45:14Z","timestamp":1725749114033},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407789"},{"type":"electronic","value":"9783642407796"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_10","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T07:32:11Z","timestamp":1379316731000},"page":"123-134","source":"Crossref","is-referenced-by-count":0,"title":["Pit Stop for an Audio Steganography Algorithm"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Westfeld","sequence":"first","affiliation":[]},{"given":"J\u00fcrgen","family":"Wurzer","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Fabian","sequence":"additional","affiliation":[]},{"given":"Ernst","family":"Piller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Tachibana, R., Shimizu, S., Nakamura, T., Kobayashi, S.: An audio watermarking method robust against time- and frequency-fluctuation. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents III (Proc. of SPIE), San Jose, CA, pp. 104\u2013115 (2001)","DOI":"10.1117\/12.435390"},{"key":"10_CR2","unstructured":"van der Veen, M., Bruekers, F., Haitsma, J., Klaker, T., Lemma, A.N., Oomen, W.: Robust multi-functional and high-quality audio watermarking technology. In: 110th Audio Engineering Society Convention. Volume Convention Paper 5345 (2001)"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1109\/TSP.2003.809384","volume":"51","author":"D. Kirovski","year":"2003","unstructured":"Kirovski, D., Malvar, H.S.: Spread-spectrum watermarking of audio signals. IEEE Trans. on Signal Processing\u00a051, 1020\u20131033 (2003)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"10_CR4","unstructured":"Steinebach, M., Petitcolas, F., Raynal, F., Dittmann, J., Fontaine, C., Seibel, S., Fates, N., Ferri, L.: StirMark benchmark: audio watermarking attacks. In: International Conference on Information Technology: Coding and Computing, pp. 49\u201354 (2001)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-04431-1_8","volume-title":"Information Hiding","author":"M. Arnold","year":"2009","unstructured":"Arnold, M., Baum, P.G., Voe\u00dfing, W.: A phase modulation audio watermarking technique. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol.\u00a05806, pp. 102\u2013116. Springer, Heidelberg (2009)"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"L.M. Marvel","year":"1999","unstructured":"Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing\u00a08, 1075\u20131083 (1999)","journal-title":"IEEE Transactions on Image Processing"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TCOM.1982.1095533","volume":"30","author":"R.L. Pickholtz","year":"1982","unstructured":"Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of spread-spectrum communications\u2014a tutorial. IEEE Transactions on Communications\u00a030, 855\u2013884 (1982)","journal-title":"IEEE Transactions on Communications"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"F.A.P. Petitcolas","year":"1998","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 218\u2013238. Springer, Heidelberg (1998)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-74124-4_14","volume-title":"Information Hiding","author":"A. Westfeld","year":"2007","unstructured":"Westfeld, A.: Steganography for radio amateurs\u2014 A DSSS based approach for slow scan television. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 201\u2013215. Springer, Heidelberg (2007)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Nutzinger, M., Fabian, C., Marschalek, M.: Secure hybrid spread spectrum system for stegnanography in auditive media. In: 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP, pp. 78\u201381 (2010)","DOI":"10.1109\/IIHMSP.2010.27"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Nutzinger, M., Wurzer, J.: A novel phase coding technique for steganography in auditive media. In: 6th International Conference on Availability, Reliability and Security, ARES, pp. 91\u201398 (2011)","DOI":"10.1109\/ARES.2011.22"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-49380-8_20","volume-title":"Information Hiding","author":"M. Maes","year":"1998","unstructured":"Maes, M.: Twin Peaks: The histogram attack to fixed depth image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 290\u2013305. Springer, Heidelberg (1998)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Bas, P., Westfeld, A.: Two key estimation techniques for the broken arrows watermarking scheme. In: Proc. of ACM Multimedia and Security Workshop, Princeton, NJ, USA, pp. 1\u20138 (2009)","DOI":"10.1145\/1597817.1597819"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., Fridrich, J.: Calibration revisited. In: Proc. of ACM Multimedia and Security Workshop, Princeton, NJ, USA, pp. 63\u201373 (2009)","DOI":"10.1145\/1597817.1597830"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T05:53:07Z","timestamp":1558072387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40779-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40779-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}