{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:47Z","timestamp":1766298347343},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,11,28]],"date-time":"2007-11-28T00:00:00Z","timestamp":1196208000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1007\/s10623-007-9135-9","type":"journal-article","created":{"date-parts":[[2007,11,27]],"date-time":"2007-11-27T18:21:20Z","timestamp":1196187680000},"page":"67-81","source":"Crossref","is-referenced-by-count":21,"title":["A coding problem in steganography"],"prefix":"10.1007","volume":"46","author":[{"given":"Weiming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shiqu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,11,28]]},"reference":[{"key":"9135_CR1","unstructured":"Crandall R.: Some notes on steganography. Available: http:\/\/os.inf.tu-dresden.de\/~westfeld\/crandall.pdf (1998). Accessed August 2007"},{"key":"9135_CR2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1117\/12.521350","volume":"5306","author":"J. Fridrich","year":"2004","unstructured":"Fridrich J., Goljan M. (2004). On estimation of secret message length in LSB steganography in spatial domain. Proceedings of SPIE-Security. Steganography and Watermarking of Multimedia Contents VI 5306, 23\u201334","journal-title":"Proceedings of SPIE-Security. Steganography and Watermarking of Multimedia Contents VI"},{"key":"9135_CR3","doi-asserted-by":"crossref","unstructured":"Fridrich J., Goljan M., Soukal D.: Searching for the stego key. In: Proceedings of SPIE-Security, Steganography and Watermarking of Multimedia Contents VI, Electronic Imaging 5306, 70\u201382 (2004).","DOI":"10.1117\/12.521353"},{"key":"9135_CR4","unstructured":"Chen Y.Y., Pan H.K., Tseng Y.C.: A secure data hiding scheme for two color images. In IEEE Symposium On Computer and Communications (2000) Available: http:\/\/www.csie.nctu.edu.tw\/yctseng . Accessed May 2005"},{"issue":"7","key":"9135_CR5","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/TC.2002.1017706","volume":"51","author":"Y.C. Tseng","year":"2002","unstructured":"Tseng Y.C., Pan H.K. (2002). Data hiding in 2-color images. IEEE Trans. Comput. 51(7): 873\u2013890","journal-title":"IEEE Trans. Comput."},{"key":"9135_CR6","unstructured":"Westfeld A.: F5: a steganographic algorithm, high capacity despite better steganalysis. Proceedings of 4th International Workshop on Information Hiding. LNCS 2137, 289\u2013302 (2001)."},{"key":"9135_CR7","volume-title":"The theory of\u00ff Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A. (1977) The theory of\u00ff Error-Correcting Codes. North-Holland Publishing Company, Amsterdam"},{"key":"9135_CR8","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1137\/0124010","volume":"24","author":"A. Tiet\u00e4v\u00e4inen","year":"1973","unstructured":"Tiet\u00e4v\u00e4inen A. (1973). On the nonexistence of perfect codes over finite fields. SIAM J. Appl. Math. 24: 88\u201396","journal-title":"SIAM J. Appl. Math."},{"issue":"7 2","key":"9135_CR9","first-page":"47","volume":"1","author":"D.S. Krotov","year":"2000","unstructured":"Krotov D.S. (2000). Lower bounds on the number of m-quasigroups of order 4 and the number of perfect binary codes. Discrete Anal. Oper. Res. 1(7) 2: 47\u201353","journal-title":"Discrete Anal. Oper. Res."},{"issue":"3","key":"9135_CR10","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/TIT.2002.808134","volume":"49","author":"P. Moulin","year":"2003","unstructured":"Moulin P., O\u2019Sullivan J.A. (2003). Information theoretic analysis of information hiding. IEEE Trans. Inform Theory, 49(3): 563\u2013593","journal-title":"IEEE Trans. Inform Theory"},{"key":"9135_CR11","unstructured":"Moulin P., Wang Y.: New results on steganographic capacity. Proceeding of CISS 2004. University of Princeton, Princeton, New Jersey (2004). Available: http:\/\/www.ifp.uiuc.edu\/~ywang11\/paper\/CISS04_204.pdf . Accessed August 2007"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9135-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-007-9135-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9135-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:09Z","timestamp":1559245809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-007-9135-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,28]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["9135"],"URL":"https:\/\/doi.org\/10.1007\/s10623-007-9135-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11,28]]}}}