{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:32:12Z","timestamp":1773858732251,"version":"3.50.1"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2004,10]]},"abstract":"<jats:p>For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.<\/jats:p>","DOI":"10.1145\/1022594.1022597","type":"journal-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:38:56Z","timestamp":1097170736000},"page":"76-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":264,"title":["Cyber warfare"],"prefix":"10.1145","volume":"47","author":[{"given":"Huaiqing","family":"Wang","sequence":"first","affiliation":[{"name":"City University of Hong Kong"}]},{"given":"Shuozhong","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai University, China"}]}],"member":"320","published-online":{"date-parts":[[2004,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.511977"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.465263"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.10029"},{"key":"e_1_2_1_5_1","first-page":"56","article-title":"Defining security in steganographic systems. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV (San Jose","volume":"50","author":"Katzenbeisser S.","year":"2002","unstructured":"Katzenbeisser , S. and Petitcolas , F . Defining security in steganographic systems. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV (San Jose , CA, Jan 21--24). International Society for Optical Engineering , 2002 , 50 -- 56 . Katzenbeisser, S. and Petitcolas, F. Defining security in steganographic systems. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV (San Jose, CA, Jan 21--24). International Society for Optical Engineering, 2002, 50--56.","journal-title":"CA, Jan 21--24). International Society for Optical Engineering"},{"key":"e_1_2_1_6_1","first-page":"1","article-title":"What infosec professionals should know about information warfare tactics by terrorists (Parts 1 and 2)","volume":"21","author":"Kovacich G.","year":"2002","unstructured":"Kovacich , G. and Jones , A . What infosec professionals should know about information warfare tactics by terrorists (Parts 1 and 2) . Comput. & Sec. 21 , 1 ( Jan. 2002 ), 35--41; 21, 2 (Mar. 2002), 113--119. Kovacich, G. and Jones, A. What infosec professionals should know about information warfare tactics by terrorists (Parts 1 and 2). Comput. & Sec. 21, 1 (Jan. 2002), 35--41; 21, 2 (Mar. 2002), 113--119.","journal-title":"Comput. & Sec."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/278476.278485"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366189"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of Network and Distributed System Security Symposium","author":"Provos N.","year":"2002","unstructured":"Provos , N. and Honeyman , P . Detecting steganographic content on the Internet . In Proceedings of Network and Distributed System Security Symposium ( San Diego, Feb. 6--8). Internet Society, Reston, VA , 2002 . Provos, N. and Honeyman, P. Detecting steganographic content on the Internet. In Proceedings of Network and Distributed System Security Symposium (San Diego, Feb. 6--8). Internet Society, Reston, VA, 2002."},{"key":"e_1_2_1_11_1","series-title":"Lecture Notes in Computer Science 2137","volume-title":"F5-Steganographic algorithm: High capacity despite better steganalysis","author":"Westfeld A.","year":"2001","unstructured":"Westfeld , A. F5-Steganographic algorithm: High capacity despite better steganalysis . In Lecture Notes in Computer Science 2137 . Springer-Verlag , Berlin , 2001 , 289--302. Westfeld, A. F5-Steganographic algorithm: High capacity despite better steganalysis. In Lecture Notes in Computer Science 2137. Springer-Verlag, Berlin, 2001, 289--302."},{"key":"e_1_2_1_12_1","series-title":"Lecture Notes in Computer Science 2137","volume-title":"Detecting low embedding rates","author":"Westfeld A.","year":"2003","unstructured":"Westfeld , A. Detecting low embedding rates . In Lecture Notes in Computer Science 2137 . Springer-Verlag , Berlin , 2003 , 324--339. Westfeld, A. Detecting low embedding rates. In Lecture Notes in Computer Science 2137. Springer-Verlag, Berlin, 2003, 324--339."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022594.1022597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1022594.1022597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:25Z","timestamp":1750282885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022594.1022597"}},"subtitle":["steganography vs. steganalysis"],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":12,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2004,10]]}},"alternative-id":["10.1145\/1022594.1022597"],"URL":"https:\/\/doi.org\/10.1145\/1022594.1022597","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,10]]},"assertion":[{"value":"2004-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}