{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T08:55:46Z","timestamp":1699520146411},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2012,5,10]],"date-time":"2012-05-10T00:00:00Z","timestamp":1336608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1007\/s11432-012-4598-3","type":"journal-article","created":{"date-parts":[[2012,5,9]],"date-time":"2012-05-09T23:09:13Z","timestamp":1336604953000},"page":"1639-1649","source":"Crossref","is-referenced-by-count":5,"title":["Efficient construction of provably secure steganography under ordinary covert channels"],"prefix":"10.1007","volume":"55","author":[{"given":"Yan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"MengYang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"HongXin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"HongJia","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,10]]},"reference":[{"key":"4598_CR1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-3-540-40956-4_9","volume-title":"Privacy Enhancing Technologies","author":"N. Feamster","year":"2003","unstructured":"Feamster N, Balazinska M, Wang W, et al. Thwarting Web censorship with untrusted messenger discovery. In: Dingledine R, ed. Privacy Enhancing Technologies. LNCS 2760. Berlin: Springer, 2003. 125\u2013140"},{"key":"4598_CR2","series-title":"LNCS","first-page":"41","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2002","unstructured":"Serjantov A, Danezis G. Towards an information theoretic metric for anonymity. In: Dingledine R, Syverson P F, eds. Privacy Enhancing Technologies. LNCS 2482. Berlin: Springer, 2002. 41\u201353"},{"key":"4598_CR3","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh D, Shaw J. Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory, 1998, 44: 1897\u20131905","journal-title":"IEEE Trans Inf Theory"},{"key":"4598_CR4","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Proceedings of the 2nd Workshop on Information Hiding (IH 1998)","author":"C. Cachin","year":"1998","unstructured":"Cachin C. An information-theoretic model for steganography. In: Aucsmith D, ed. Proceedings of the 2nd Workshop on Information Hiding (IH 1998). LNCS 1525. Portland: Springer, 1998. 306\u2013318"},{"key":"4598_CR5","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"N. J. Hopper","year":"2002","unstructured":"Hopper N J, Langford J, Ahn L V. Provably secure steganography. In: Yung M, ed. Advances in Cryptology \u2014 CRYPTO 2002. LNCS 2442. Santa Barbara: Springer, 2002. 77\u201392"},{"key":"4598_CR6","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1109\/TC.2008.199","volume":"58","author":"N. J. Hopper","year":"2009","unstructured":"Hopper N J, Ahn L V, Langford J. Provably secure steganography. IEEE Trans Comput, 2009, 58: 662\u2013676","journal-title":"IEEE Trans Comput"},{"key":"4598_CR7","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-3-540-30108-0_21","volume-title":"Proceedings of the 9th European Symposium on Research in Computer Security, ESORICS 2004","author":"B. M\u00f6ller","year":"2004","unstructured":"M\u00f6ller B. A public-key encryption scheme with pseudo-random ciphertexts. In: Samarati P, Ryan P Y A, Gollmann D, et al, eds. Proceedings of the 9th European Symposium on Research in Computer Security, ESORICS 2004. LNCS 3193. Sophia Antipolis: Springer, 2004. 335\u2013351"},{"key":"4598_CR8","series-title":"LNCS","first-page":"227","volume-title":"Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005","author":"N. Dedic","year":"2005","unstructured":"Dedic N, Itkis G, Reyzin L, et al. Upper and lower bounds on black-box steganography. In: Backes M, Cachin C, eds. Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005. LNCS 3378. Cambridge: Springer, 2005. 227\u2013244"},{"key":"4598_CR9","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-540-24676-3_20","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2004","author":"L. V. Ahn","year":"2004","unstructured":"Ahn L V, Hopper N J. Public-key steganography. In: Cachin C, Camenisch J, eds. Advances in Cryptology \u2014 EUROCRYPT 2004. LNCS 3027. Interlaken: Springer, 2004. 323\u2013341"},{"key":"4598_CR10","series-title":"LNCS","first-page":"210","volume-title":"Theory of Cryptography, Second Theory of Cryptography Conference (TCC 2005)","author":"M. Backes","year":"2005","unstructured":"Backes M, Cachin C. Public-key steganography with active attacks. In: Kilian J, ed. Theory of Cryptography, Second Theory of Cryptography Conference (TCC 2005). LNCS 3378. Cambridge: Springer, 2005. 210\u2013226"},{"key":"4598_CR11","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/11523468_26","volume-title":"Proceedings of the 32nd International Colloquium on Automata Languages and Programming (ICALP 2005)","author":"N. J. Hopper","year":"2005","unstructured":"Hopper N J. On steganographic chosen covertext security. In: Caires L, Italiano G F, Monteiro L, et al, eds. Proceedings of the 32nd International Colloquium on Automata Languages and Programming (ICALP 2005). LNCS 3580. Lisbon: Springer, 2005. 311\u2013323"},{"key":"4598_CR12","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/11745853_9","volume-title":"Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography (PKC 2006)","author":"A. Lysyanskaya","year":"2006","unstructured":"Lysyanskaya A, Meyerovich M. Provably secure steganography with imperfect sampling. In: Yung M, Dodis Y, Kiayias A, et al, eds. Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography (PKC 2006). LNCS 3958. New York: Springer, 2006. 123\u2013139"},{"key":"4598_CR13","unstructured":"Goldwasser S, Bellare M. Lecture Notes on Cryptography. 2008. http:\/\/www-cse.ucsd.edu\/mihir\/papers\/gb.html"},{"key":"4598_CR14","first-page":"80","volume-title":"Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS 1982)","author":"A. C. Yao","year":"1982","unstructured":"Yao A C. Theory and application of trapdoor functions. In: Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS 1982). Chicago: IEEE Computer Society, 1982. 80\u201391"},{"key":"4598_CR15","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of cryptography volume I, Basic tools","author":"O. Goldreich","year":"2001","unstructured":"Goldreich O. Foundations of cryptography volume I, Basic tools. London: Cambridge University Press, 2001"},{"key":"4598_CR16","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1007\/s11432-010-0044-6","volume":"53","author":"X. Y. Luo","year":"2010","unstructured":"Luo X Y, Liu F L, Yang C F, et al. Image universal steganalysis based on best wavelet packet decomposition. Sci China Inf Sci, 2010, 53: 634\u2013647","journal-title":"Sci China Inf Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4598-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-012-4598-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4598-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:37:46Z","timestamp":1559403466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-012-4598-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,10]]},"references-count":16,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["4598"],"URL":"https:\/\/doi.org\/10.1007\/s11432-012-4598-3","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,10]]}}}