{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:32:43Z","timestamp":1771489963373,"version":"3.50.1"},"reference-count":64,"publisher":"Elsevier","isbn-type":[{"value":"9780123855107","type":"print"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1016\/b978-0-12-385510-7.00002-3","type":"book-chapter","created":{"date-parts":[[2012,3,24]],"date-time":"2012-03-24T16:55:23Z","timestamp":1332608123000},"page":"51-107","source":"Crossref","is-referenced-by-count":33,"title":["An Overview of Steganography"],"prefix":"10.1016","author":[{"given":"Gary C.","family":"Kessler","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chet","family":"Hosmer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0005","series-title":"Decrypted Secrets: Methods and Maxims of Cryptology","author":"Bauer","year":"2007"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0010","article-title":"Discovering covert digital evidence","author":"Hosmer","year":"2003"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0015","series-title":"Techniques and Applications of Digital Watermarking and Content Protection","author":"Arnold","year":"2003"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0020","series-title":"Information Hiding: Steganography and Watermarking\u2014Attacks and Countermeasures","author":"Johnson","year":"2001"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0025","series-title":"The Codebreakers: The Story of Secret Writing","author":"Kahn","year":"1996"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0030","series-title":"Disappearing Cryptography\u2014Information Hiding: Steganography & Watermarking","author":"Wayner","year":"2009"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0035","series-title":"Wikipedia, the Free Encyclopedia","year":"2010"},{"issue":"8","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0040","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/35.940048","article-title":"Watermark embedding: hiding a signal within a cover image","volume":"39","author":"Barni","year":"2001","journal-title":"IEEE Commun."},{"issue":"10","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0045","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1145\/944217.944219","article-title":"Watermark-based Copyright Protection System Security","volume":"46","author":"Kwok","year":"2003","journal-title":"Commun. ACM"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0050","series-title":"The Science of Digital Investigation blog","article-title":"Steganography vs. Digital Watermarking","author":"Duren","year":"2008"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0055","author":"Clinton"},{"issue":"3","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0060","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/4236.935180","article-title":"Digital steganography: hiding data within data","volume":"5","author":"Artz","year":"2001","journal-title":"IEEE Internet Comput."},{"issue":"2","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0070","article-title":"An evaluation of image based steganography methods","volume":"2","author":"Curran","year":"2003","journal-title":"Int. J. Digital Evidence"},{"issue":"2","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0075","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.1998.4655281","article-title":"Exploring steganography: seeing the unseen","volume":"31","author":"Johnson","year":"1998","journal-title":"IEEE Computer"},{"issue":"3","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0085","doi-asserted-by":"crossref","DOI":"10.1109\/MSECP.2003.1203220","article-title":"Hide and seek: an introduction to steganography","volume":"1","author":"Provos","year":"2003","journal-title":"IEEE Security Privacy"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0090","series-title":"Engineering and Operations in the Bell System","year":"1983"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0095","series-title":"The MP3 and Internet Audio Handbook","author":"Fries","year":"2000"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0100","first-page":"273","article-title":"Steganalysis of images created using current steganography software","volume":"vol. 1525","author":"Johnson","year":"1998"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0105","author":"Kessler"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0110","series-title":"Spam Mimic","year":"2009"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0115","author":"hydan"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0120","first-page":"187","article-title":"Hydan: Hiding Information in Program Binaries","author":"El-Khalil","year":"2004"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0125","author":"Kessler"},{"issue":"2","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0130","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1080\/15567280802047150","article-title":"A simple image hiding technique: what you may be missing","volume":"2","author":"Inch","year":"2008","journal-title":"J. Digital Forensic Pract."},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0135","first-page":"47","article-title":"Secure steganographic methods for palette images","volume":"vol. 1768","author":"Fridrich","year":"1999"},{"issue":"6","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0140","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MC.1984.1659158","article-title":"A technique for high-performance data compression","volume":"17","author":"Welch","year":"1984","journal-title":"IEEE Computer"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0145","series-title":"Proceedings of the 4th Annual Conference on Information Security Curriculum Development 2007, September 28\u201329","article-title":"Covert Computer and Network Communications","author":"Newman","year":"2007"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0150","first-page":"17","article-title":"WLAN steganography: a first practical review","author":"Kr\u00e4tzer","year":"2006"},{"issue":"5","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0155","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v2i5.528","article-title":"Covert channels in the TCP\/IP protocol suite","volume":"2","author":"Rowland","year":"1996","journal-title":"First Monday"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0160","series-title":"Proceedings of the 7th Information Hiding Workshop","article-title":"Embedding covert channels into TCP\/IP","author":"Murdoch","year":"2005"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0165","series-title":"Proceedings of On the Move to Meaningful Internet Systems: OTM 2008","first-page":"1001","article-title":"Steganography of VoIP Streams","author":"Mazurczyk","year":"2008"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0170","series-title":"RTP: A Transport Protocol for Real-Time Applications","author":"Schulzrinne","year":"1889"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0180","series-title":"Proceedings of the Second International Workshop on Information Hiding (IH '98), Portland, OR","first-page":"73","article-title":"The Steganographic File System","volume":"vol. 1525","author":"Anderson","year":"1998"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0185","first-page":"462","article-title":"StegFS: a steganographic file system for Linux","volume":"vol. 1768","author":"McDonald","year":"1999"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0190","series-title":"Advances in Cryptology: Proceedings of CRYPTO 83, Santa Barbara, CA","first-page":"51","article-title":"The prisoners' problem and the subliminal channel","author":"Simmons","year":"1984"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0195","series-title":"Proceedings of SPIE Security and Watermarking of Multimedia Contents IV","first-page":"14","article-title":"Mathematical approach to steganalysis","author":"Chandramouli","year":"2002"},{"issue":"3","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0200","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/s00530-003-0100-9","article-title":"Quantitative steganalysis of digital images: estimating the secret message length","volume":"9","author":"Fridrich","year":"2003","journal-title":"ACM Multimedia Syst. J."},{"issue":"4","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0205","article-title":"Blind steganography detection using a computational immune system: a work in progress","volume":"1","author":"Jackson","year":"2003","journal-title":"Int. J. Digital Evidence"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0210","series-title":"Detecting Steganographic Messages in Digital Images","author":"Farid","year":"2001"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0215","series-title":"Proceedings of SPIE Security and Watermarking of Multimedia Contents IV","first-page":"1","article-title":"Practical steganalysis\u2014state of the art","author":"Fridrich","year":"2002"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0220","series-title":"Proceedings of SPIE Security and Watermarking of Multimedia Contents V","first-page":"55","article-title":"Steganalysis of Audio Based on Audio Quality Metrics","author":"\u00d6zer","year":"2003"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0225","series-title":"Detecting Steganographic Content on the Internet","author":"Provos","year":"2001"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0230","series-title":"Proceedings of SPIE Multimedia Systems and Applications IV","first-page":"275","article-title":"Steganalysis based on JPEG compatibility","author":"Fridrich","year":"2001"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0235","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36415-3_20","article-title":"Steganalysis of JPEG images: breaking the F5 algorithm","author":"Fridrich","year":"2002"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0240","article-title":"Attacking the OutGuess","author":"Fridrich","year":"2002"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0245","series-title":"Proceedings of SPIE Security and Watermarking of Multimedia Contents IV","first-page":"143","article-title":"New methodology for breaking steganographic techniques for JPEGs","author":"Fridrich","year":"2003"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0250","doi-asserted-by":"crossref","DOI":"10.1109\/CVPRW.2003.10093","article-title":"Higher-order wavelet statistics and their application to digital forensics","author":"Farid","year":"2003"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0255","article-title":"Secret Messages Come In .Wavs","author":"McCullagh","year":"2001","journal-title":"WIRED News"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0260","series-title":"Proceedings of the Workshop of Information Hiding and Digital Watermarking","article-title":"A survey of steganographic and steganalytic tools for the digital forensic investigator","author":"Hayati","year":"2007"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0265","author":"WetStone Technologies"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0270","author":"WetStone Technologies"},{"issue":"8","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0290","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/35.940051","article-title":"Information retrieval in digital watermarking","volume":"39","author":"Martin","year":"2001","journal-title":"IEEE Commun"},{"issue":"8","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0295","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/35.940053","article-title":"Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks","volume":"39","author":"Voloshynovskiy","year":"2001","journal-title":"IEEE Commun."},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0300","author":"Petitcolas"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0305","article-title":"Terror groups hide behind Web encryption","author":"Kelly","year":"2001","journal-title":"USA Today Online"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0310","article-title":"Veiled messages of terror may lurk in cyberspace","author":"Kolata","year":"2001","journal-title":"The New York Times Online"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0315","author":"Manoo"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0320","article-title":"Arrests of alleged spies draws attention to long obscure field of steganography","author":"Montgomery","year":"2010","journal-title":"The Washington Post"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0325","article-title":"FBI: spies hid secret messages on public Websites","author":"Shactman","year":"2010","journal-title":"WIRED Magazine Online"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0330","series-title":"Detecting Steganographic Content in Images Found on the Internet","author":"Callinan","year":"2001"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0335","series-title":"Guide to Computer Forensics and Investigations","author":"Nelson","year":"2008"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0340","series-title":"Forensic Examination of Digital Evidence: A Guide for Law Enforcement","year":"2004"},{"key":"10.1016\/B978-0-12-385510-7.00002-3_bb0345","series-title":"Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations","year":"2009"},{"issue":"2","key":"10.1016\/B978-0-12-385510-7.00002-3_bb0350","article-title":"The debtor's digital reckonings","volume":"2","author":"Seward","year":"2003","journal-title":"Int. J. Digital Evidence"}],"container-title":["Advances in Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780123855107000023?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780123855107000023?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T01:41:02Z","timestamp":1561513262000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780123855107000023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9780123855107"],"references-count":64,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-385510-7.00002-3","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]}}}