{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:48Z","timestamp":1750307928707,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231066","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"85-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Steganography obliterator"],"prefix":"10.1145","author":[{"suffix":"III","given":"Guillermo A.","family":"Francia","sequence":"first","affiliation":[{"name":"Jacksonville State University, Jacksonville, Alabama"}]},{"given":"Tyler S.","family":"Gomez","sequence":"additional","affiliation":[{"name":"Jacksonville State University, Jacksonville, Alabama"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Website: http:\/\/userpages.umbc.edu\/~mabzug1\/cs\/md5\/md5.html]]","author":"Abzug M. T.","year":"1991","unstructured":"Abzug , M. T. \"MD5 Homepage (unofficial).\" ( 1991 ). Website: http:\/\/userpages.umbc.edu\/~mabzug1\/cs\/md5\/md5.html]] Abzug, M. T. \"MD5 Homepage (unofficial).\" (1991). Website: http:\/\/userpages.umbc.edu\/~mabzug1\/cs\/md5\/md5.html]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"e_1_3_2_1_3_1","unstructured":"Arachelian R. White Noise Storm. Website: http:\/\/www.packetstormsecurity.org\/crypt\/stego\/wns210.zip]]  Arachelian R. White Noise Storm. Website: http:\/\/www.packetstormsecurity.org\/crypt\/stego\/wns210.zip]]"},{"key":"e_1_3_2_1_4_1","unstructured":"Brown A. S-Tools for Windows. (1994) Website: http:\/\/www.packetstormsecurity.org\/crypt\/stego\/s-tools\/s-tools4.zip]]  Brown A. S-Tools for Windows . (1994) Website: http:\/\/www.packetstormsecurity.org\/crypt\/stego\/s-tools\/s-tools4.zip]]"},{"key":"e_1_3_2_1_5_1","unstructured":"Brown Andy. \"How S-Tools hides your data.\" S-Tools Help file.]]  Brown Andy. \"How S-Tools hides your data.\" S-Tools Help file.]]"},{"key":"e_1_3_2_1_6_1","unstructured":"Andy Brown. \"How data is hidden in sound.\" S-Tools Help file.]]  Andy Brown. \"How data is hidden in sound.\" S-Tools Help file.]]"},{"key":"e_1_3_2_1_7_1","unstructured":"Doppelt Adam. \"GIFEncoder. Java.\" Website: http:\/\/www.gurge.com\/amd\/old\/java\/GIFEncoder\/src\/GIFEncoder.java]]  Doppelt Adam. \"GIFEncoder. Java.\" Website: http:\/\/www.gurge.com\/amd\/old\/java\/GIFEncoder\/src\/GIFEncoder.java]]"},{"key":"e_1_3_2_1_8_1","volume-title":"Steganalysis of LSB Encoding in Color Images. ICME 2000","author":"Fridrich J.","year":"2000","unstructured":"Fridrich , J. , Du , R. , and Meng , L . Steganalysis of LSB Encoding in Color Images. ICME 2000 , New York City, July 31--August 2, New York, USA. 2000 .]] Fridrich, J., Du, R., and Meng, L. Steganalysis of LSB Encoding in Color Images. ICME 2000, New York City, July 31--August 2, New York, USA. 2000.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. SPIE Photonics West","volume":"4675","author":"Fridrich J.","year":"2002","unstructured":"Fridrich , J. and Goljan , M . Practical Steganalysis of Digital Images - State of the Art . Proc. SPIE Photonics West , Vol. 4675 , Electronic Imaging 2002 , Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, pp. 1--13]] Fridrich, J. and Goljan, M. Practical Steganalysis of Digital Images - State of the Art. Proc. SPIE Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, pp. 1--13]]"},{"key":"e_1_3_2_1_10_1","volume-title":"Website: http:\/\/www.mirrors.wiretapped.net\/security\/steganography\/mand steg\/]]","author":"Hastur H.","year":"1999","unstructured":"Hastur , H. Mandelsteg . ( 1999 ) Website: http:\/\/www.mirrors.wiretapped.net\/security\/steganography\/mand steg\/]] Hastur, H. Mandelsteg. (1999) Website: http:\/\/www.mirrors.wiretapped.net\/security\/steganography\/mand steg\/]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_19"},{"key":"e_1_3_2_1_12_1","first-page":"2","article-title":"Exploring Steganography:Seeing the Unseen","author":"Johnson N. F.","year":"1998","unstructured":"Johnson , N. F. and Jajodia , S . \" Exploring Steganography:Seeing the Unseen .\" IEEE Computer. February 1998 . vol.31 no. 2 , pp. 26--34.]] Johnson, N. F. and Jajodia, S. \"Exploring Steganography:Seeing the Unseen.\" IEEE Computer. February 1998. vol.31 no. 2, pp. 26--34.]]","journal-title":"IEEE Computer."},{"key":"e_1_3_2_1_13_1","unstructured":"Kessler Gary C. \"An Overview of Steganography for the Computer Forensics Examiner \" Forensic Science Communications vol. 6 no. 3 July 2004.]]  Kessler Gary C. \"An Overview of Steganography for the Computer Forensics Examiner \" Forensic Science Communications vol. 6 no. 3 July 2004.]]"},{"key":"e_1_3_2_1_14_1","first-page":"16","article-title":"Benchmarking steganographic and steganalysis techniques","volume":"5681","author":"Kharrazia","year":"2005","unstructured":"Kharrazia , Mehdi, Husrev T. Sencar , and Nasir Memon. \" Benchmarking steganographic and steganalysis techniques .\" Proc. SPIE Vol. 5681 . January 16 -- 20 , 2005 . pp. 252--263. Website: http:\/\/isis.poly.edu\/projects\/stego\/pubs\/spie05.pdf.]] Kharrazia, Mehdi, Husrev T. Sencar, and Nasir Memon. \"Benchmarking steganographic and steganalysis techniques.\" Proc. SPIE Vol.5681. January 16--20, 2005. pp. 252--263. Website: http:\/\/isis.poly.edu\/projects\/stego\/pubs\/spie05.pdf.]]","journal-title":"Proc. SPIE"},{"key":"e_1_3_2_1_15_1","volume-title":"Investigator's Guide to Steganography","author":"Kipper G.","year":"2004","unstructured":"Kipper , G. Investigator's Guide to Steganography . CRC Press . Boca Raton, Florida. 2004 .]] Kipper, G. Investigator's Guide to Steganography. CRC Press. Boca Raton, Florida. 2004.]]"},{"key":"e_1_3_2_1_16_1","unstructured":"16ado R. EzStego Stego Online. Website: http:\/\/www.stego.com]]  16ado R. EzStego Stego Online. Website: http:\/\/www.stego.com]]"},{"key":"e_1_3_2_1_17_1","volume-title":"Website: http:\/\/www.packetstormsecurity.org\/crypt\/stego\/hideseek\/]]","author":"Maroney C.","year":"1999","unstructured":"Maroney , C. Hide and Seek. ( 1999 ) Website: http:\/\/www.packetstormsecurity.org\/crypt\/stego\/hideseek\/]] Maroney, C. Hide and Seek. (1999) Website: http:\/\/www.packetstormsecurity.org\/crypt\/stego\/hideseek\/]]"},{"key":"e_1_3_2_1_18_1","unstructured":"Provos N. \"Defending Against Statistical Steganalysis.\" Proceedings of the 10<sup>th<\/sup> USENIX Security Symposium. Washington DC. August 13--17 2001.]]   Provos N. \"Defending Against Statistical Steganalysis.\" Proceedings of the 10<sup>th<\/sup> USENIX Security Symposium. Washington DC. August 13--17 2001.]]"},{"key":"e_1_3_2_1_19_1","unstructured":"Provos N. \"Steganography Detection with Stegdetect.\" Website: http:\/\/www.outguess.org\/detection.php]]  Provos N. \"Steganography Detection with Stegdetect.\" Website: http:\/\/www.outguess.org\/detection.php]]"},{"key":"e_1_3_2_1_20_1","unstructured":"Provos N. OutGuess Download Page. Website: http:\/\/www.outguess.org\/download.php]]  Provos N. OutGuess Download Page. Website: http:\/\/www.outguess.org\/download.php]]"},{"key":"e_1_3_2_1_21_1","volume-title":"Detecting hidden information with computer forensic analysis.\" SANS\/GIAC Practical Assignment for GSEC Certification","author":"Richer P.","year":"2003","unstructured":"Richer , P. , \" Steganalysis : Detecting hidden information with computer forensic analysis.\" SANS\/GIAC Practical Assignment for GSEC Certification , SANS Institute 2003 .]] Richer, P., \"Steganalysis: Detecting hidden information with computer forensic analysis.\" SANS\/GIAC Practical Assignment for GSEC Certification, SANS Institute 2003.]]"},{"key":"e_1_3_2_1_22_1","unstructured":"Steganography Analysis and Research Center. Website: http:\/\/www.22-wv.com\/stegalyzerss.aspx]]  Steganography Analysis and Research Center. Website: http:\/\/www.22-wv.com\/stegalyzerss.aspx]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/331624.331630"},{"key":"e_1_3_2_1_24_1","volume-title":"UK. \"Graphics file format.\"","author":"School","year":"1997","unstructured":"School of Informatics , The University of Edinburgh , UK. \"Graphics file format.\" ( 1997 ). Website : http:\/\/www.dcs.ed.ac.uk\/home\/mxr\/gfx]] School of Informatics, The University of Edinburgh, UK. \"Graphics file format.\" (1997). Website: http:\/\/www.dcs.ed.ac.uk\/home\/mxr\/gfx]]"},{"key":"e_1_3_2_1_25_1","volume-title":"Website: http:\/\/www.sonicspot.com\/guide\/wavefiles.html]]","author":"The Sonic Spot","year":"2006","unstructured":"The Sonic Spot . ( 2006 ) Website: http:\/\/www.sonicspot.com\/guide\/wavefiles.html]] The Sonic Spot. (2006) Website: http:\/\/www.sonicspot.com\/guide\/wavefiles.html]]"},{"key":"e_1_3_2_1_26_1","unstructured":"Sun Microsystems Inc. (2001) \"Java Image I\/O API Guide.\" Website: http:\/\/java.sun.com\/j2se\/l.4.2\/docs\/guide\/imageio\/spec\/imageio_guideTOC.fm.html.]]  Sun Microsystems Inc. (2001) \"Java Image I\/O API Guide.\" Website: http:\/\/java.sun.com\/j2se\/l.4.2\/docs\/guide\/imageio\/spec\/imageio_guideTOC.fm.html.]]"},{"key":"e_1_3_2_1_27_1","volume-title":"Disappearing Cryptography. Information Hiding: Steganography &amp","author":"Wayner P.","year":"2002","unstructured":"Wayner , P. Disappearing Cryptography. Information Hiding: Steganography &amp ; Watermarking. 2<sup>nd<\/sup> Ed. Morgan Kaufmann Publishers . San Francisco, CA. 2002 .]] Wayner, P. Disappearing Cryptography. Information Hiding: Steganography &amp; Watermarking. 2<sup>nd<\/sup> Ed. Morgan Kaufmann Publishers. San Francisco, CA. 2002.]]"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231066","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231066"}},"subtitle":["an attack on the least significant bits"],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":27,"alternative-id":["10.1145\/1231047.1231066","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231066","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}