{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:45:12Z","timestamp":1725749112716},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407789"},{"type":"electronic","value":"9783642407796"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_8","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T07:32:11Z","timestamp":1379316731000},"page":"105-112","source":"Crossref","is-referenced-by-count":3,"title":["Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors"],"prefix":"10.1007","author":[{"given":"Boris","family":"Assanovich","sequence":"first","affiliation":[]},{"given":"William","family":"Puech","sequence":"additional","affiliation":[]},{"given":"Iuliia","family":"Tkachenko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Kiyavash, N., Houmansadr, A., Borisov, N.: Multi-flow attacks against network flow watermarking schemes. In: USENIX Security Symposium, pp. 307\u2013320 (2008)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Gong, X., Rodrigues, M., Kiyavash, N.: Invisible flow watermarks for channels with dependent substitution and deletion errors. In: Proceedings of the International Conference on Acoustics, Speech, and Signal Proc., Kyoto, Japan, March 25-30, pp. 1773\u20131776 (2012)","DOI":"10.1109\/ICASSP.2012.6288243"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Th.\u00a047, 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Th."},{"issue":"5","key":"8_CR4","first-page":"797","volume":"37","author":"G.M. Tenengol\u2019ts","year":"1976","unstructured":"Tenengol\u2019ts, G.M.: Class of codes correcting bit loss and errors in the preceding bit. Avtomat. Telemekh.\u00a037(5), 797\u2013802 (1976)","journal-title":"Avtomat. Telemekh."},{"key":"8_CR5","unstructured":"Sklar, B.: Digital Communications: Fundamentals and Applications, 2nd edn. Prentice-Hall (2001, 2003)"},{"issue":"10","key":"8_CR6","doi-asserted-by":"publisher","first-page":"5223","DOI":"10.1109\/TIT.2010.2059790","volume":"56","author":"K.A.S. Abdel-Ghaffar","year":"2010","unstructured":"Abdel-Ghaffar, K.A.S., Ferreira, H.C., Cheng, L.: Correcting deletions using linear and cyclic codes. IEEE Trans. Inf. Th.\u00a056(10), 5223\u20135234 (2010)","journal-title":"IEEE Trans. Inf. Th."},{"issue":"2","key":"8_CR7","first-page":"286","volume":"26","author":"R.P. Varshamov","year":"1965","unstructured":"Varshamov, R.P., Tenengol\u2019ts, G.M.: Correction code for single asymmetric errors. Avtomat. Telemekh.\u00a026(2), 286\u2013290 (1965)","journal-title":"Avtomat. Telemekh."},{"issue":"8","key":"8_CR8","first-page":"707","volume":"10","author":"V.I. Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics-Doklady\u00a010(8), 707\u2013710 (1966)","journal-title":"Soviet Physics-Doklady"},{"key":"8_CR9","unstructured":"Chen, J., Mitzenmacher, M., Ng, C., Varnica, N.: Concatenated codes for deletion channels. In: Proceedings of the 2003 IEEE International Symposium on Information Theory, Yokohama, Japan, June 29-July 4, p. 218 (2003)"},{"key":"8_CR10","unstructured":"Houmansadr, A., Kiyavash, N., Borisov, N.: RAINBOW: A Robust and Invisible Non-Blind watermark for network flows. In: Proceedings of the 16th Annual Network & Distributed System Security Symposium, San Diego, USA, February 8-11 (2009)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T06:29:36Z","timestamp":1558074576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40779-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40779-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}