{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:26Z","timestamp":1750308206612,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,9,20]],"date-time":"2004-09-20T00:00:00Z","timestamp":1095638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,9,20]]},"DOI":"10.1145\/1022431.1022436","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"16-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A hierarchical protocol for increasing the stealthiness of steganographic methods"],"prefix":"10.1145","author":[{"given":"Mercan","family":"Topkara","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]},{"given":"Umut","family":"Topkara","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]},{"given":"Cuneyt","family":"Taskiran","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]},{"given":"Eugene","family":"Lin","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]},{"given":"Edward J.","family":"Delp","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]}],"member":"320","published-online":{"date-parts":[[2004,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"e_1_3_2_1_2_1","volume-title":"Natural Language Watermarking and Tamperproofng. In Fifth Information Hiding Workshop","volume":"2578","author":"Atallah M.","year":"2002","unstructured":"M. Atallah , V. Raskin , C. F. Hempelmann , M. Karahan , R. Sion , U. Topkara , and K. E. Triezenberg . Natural Language Watermarking and Tamperproofng. In Fifth Information Hiding Workshop , volume LNCS, 2578 , Noordwijkerhout, The Netherlands , October , 2002 . Springer-Verlag.]] M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U. Topkara, and K. E. Triezenberg. Natural Language Watermarking and Tamperproofng. In Fifth Information Hiding Workshop, volume LNCS, 2578, Noordwijkerhout, The Netherlands, October, 2002. Springer-Verlag.]]"},{"issue":"7","key":"e_1_3_2_1_3_1","first-page":"1181","volume":"87","author":"Brassil J. T.","year":"1999","unstructured":"J. T. Brassil , S. Low , and N. F. Maxemchuk . Copyright protection for electronic distribution of text documents. Proceedings of the IEEE (USA) , 87 ( 7 ): 1181 -- 1196 , 1999 .]] J. T. Brassil, S. Low, and N. F. Maxemchuk. Copyright protection for electronic distribution of text documents. Proceedings of the IEEE (USA), 87(7):1181--1196, 1999.]]","journal-title":"Copyright protection for electronic distribution of text documents. Proceedings of the IEEE (USA)"},{"key":"e_1_3_2_1_4_1","volume-title":"LIBSVM: a library for support vector machines","author":"Chang C.-C.","year":"2001","unstructured":"C.-C. Chang and C.-J. Lin . LIBSVM: a library for support vector machines , 2001 . Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm.]] C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines, 2001. Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm.]]"},{"key":"e_1_3_2_1_6_1","volume-title":"Steganography Preserving Statistical Properties. In Fifth Information Hiding Workshop","volume":"2578","author":"Franz E.","year":"2002","unstructured":"E. Franz . Steganography Preserving Statistical Properties. In Fifth Information Hiding Workshop , volume LNCS, 2578 , Noordwijkerhout, The Netherlands , October 2002 . Springer-Verlag.]] E. Franz. Steganography Preserving Statistical Properties. In Fifth Information Hiding Workshop, volume LNCS, 2578, Noordwijkerhout, The Netherlands, October 2002. Springer-Verlag.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.479739"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.465263"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232466"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.473142"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.473140"},{"key":"e_1_3_2_1_12_1","volume-title":"http:\/\/www.gutenberg.net\/","author":"Hart M.","year":"2004","unstructured":"M. Hart . Project Gutenberg . http:\/\/www.gutenberg.net\/ , 2004 .]] M. Hart. Project Gutenberg. http:\/\/www.gutenberg.net\/, 2004.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"Katzenbeisser S.","year":"2000","unstructured":"S. Katzenbeisser and F. Petitcolas( Ed .). Information Hiding Techniques for Steganography and Digital Watermarking . Artech House , 2000 .]] S. Katzenbeisser and F. Petitcolas(Ed.). Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.532534"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Fifth Information Hiding Workshop","volume":"2578","author":"Lyu S.","year":"2002","unstructured":"S. Lyu and H. Farid . Detecting Hidden Messages using Higher-Order Statistics and Support Vector Machines . In Proceedings of the Fifth Information Hiding Workshop , volume LNCS, 2578 , Noordwijkerhout, The Netherlands , October , 2002 . Springer-Verlag.]] S. Lyu and H. Farid. Detecting Hidden Messages using Higher-Order Statistics and Support Vector Machines. In Proceedings of the Fifth Information Hiding Workshop, volume LNCS, 2578, Noordwijkerhout, The Netherlands, October, 2002. Springer-Verlag.]]"},{"key":"e_1_3_2_1_17_1","first-page":"61","volume-title":"Third Information Hiding Workshop","volume":"1768","author":"Pfitzmann A.","year":"1999","unstructured":"A. Pfitzmann and A. Westfeld . Attacks on steganographic systems . In Third Information Hiding Workshop , volume LNCS, 1768 , pages 61 -- 76 , Dresden, Germany , 1999 . Springer-Verlag.]] A. Pfitzmann and A. Westfeld. Attacks on steganographic systems. In Third Information Hiding Workshop, volume LNCS, 1768, pages 61--76, Dresden, Germany, 1999. Springer-Verlag.]]"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of 10th USENIX Security Symposium, Washington DC, USA","author":"Provos N.","year":"2001","unstructured":"N. Provos . Defending Against Statistical Steganalysis . In Proceedings of 10th USENIX Security Symposium, Washington DC, USA , August 2001 .]] N. Provos. Defending Against Statistical Steganalysis. In Proceedings of 10th USENIX Security Symposium, Washington DC, USA, August 2001.]]"},{"key":"e_1_3_2_1_19_1","volume-title":"International Workshop on Digital Watermarking","author":"Sallee P.","year":"2003","unstructured":"P. Sallee . Model-based steganography. In International Workshop on Digital Watermarking , Seoul, Korea, 20- -22 October 2003 .]] P. Sallee. Model-based steganography. In International Workshop on Digital Watermarking, Seoul, Korea, 20--22 October 2003.]]"},{"key":"e_1_3_2_1_20_1","first-page":"289","volume-title":"Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Fourth Information Hiding Workshop","volume":"2137","author":"Westfeld A.","year":"2001","unstructured":"A. Westfeld . F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Fourth Information Hiding Workshop , volume LNCS, 2137 , pages 289 -- 302 , Pittsburgh, USA , April 2001 . Springer-Verlag.]] A. Westfeld. F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Fourth Information Hiding Workshop, volume LNCS, 2137, pages 289--302, Pittsburgh, USA, April 2001. Springer-Verlag.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"Modeling the Security of Steganographic Systems. In Second Information Hiding Workshop","volume":"1525","author":"Zollner J.","year":"1999","unstructured":"J. Zollner , H. Federrath , H. Klimant , A. Pfitzmann , R. Piotrascke , A. Westfeld , G. Wicke , and G. Wolf . Modeling the Security of Steganographic Systems. In Second Information Hiding Workshop , volume LNCS, 1525 , Portland, Oregon, USA , 1999 . Springer-Verlag.]] J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotrascke, A. Westfeld, G. Wicke, and G. Wolf. Modeling the Security of Steganographic Systems. In Second Information Hiding Workshop, volume LNCS, 1525, Portland, Oregon, USA, 1999. Springer-Verlag.]]"}],"event":{"name":"MM&Sec '04: Multimedia and Security Workshop 2004","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"],"location":"Magdeburg Germany","acronym":"MM&Sec '04"},"container-title":["Proceedings of the 2004 workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022431.1022436","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1022431.1022436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:30:56Z","timestamp":1750264256000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022431.1022436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9,20]]},"references-count":19,"alternative-id":["10.1145\/1022431.1022436","10.1145\/1022431"],"URL":"https:\/\/doi.org\/10.1145\/1022431.1022436","relation":{},"subject":[],"published":{"date-parts":[[2004,9,20]]},"assertion":[{"value":"2004-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}