{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:55Z","timestamp":1750308775614,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,11]],"date-time":"2014-06-11T00:00:00Z","timestamp":1402444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,11]]},"DOI":"10.1145\/2600918.2600942","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"97-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Predictable rain?"],"prefix":"10.1145","author":[{"given":"Matthias","family":"Carnein","sequence":"first","affiliation":[{"name":"University of M\u00fcnster, M\u00fcnster, Germany"}]},{"given":"Pascal","family":"Sch\u00f6ttle","sequence":"additional","affiliation":[{"name":"University of M\u00fcnster, M\u00fcnster, Germany"}]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[{"name":"University of M\u00fcnster, M\u00fcnster, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-61996-8_30","volume-title":"Information Hiding (1st International Workshop)","author":"Anderson R. J.","year":"1996","unstructured":"R. J. Anderson . Stretching the limits of steganography . In R. J. Anderson, editor, Information Hiding (1st International Workshop) , volume 1174 of Lecture Notes in Computer Science , pages 39 -- 48 . Springer-Verlag , Berlin Heidelberg , 1996 . R. J. Anderson. Stretching the limits of steganography. In R. J. Anderson, editor, Information Hiding (1st International Workshop), volume 1174 of Lecture Notes in Computer Science, pages 39--48. Springer-Verlag, Berlin Heidelberg, 1996."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding (13th International Workshop)","author":"Bas P.","year":"2011","unstructured":"P. Bas , T. Filler , and T. Pevny . Break our steganographic system | the ins and outs of organizing BOSS . In T. Filler, T. Pevny, S. Craver, and A. Ker, editors, Information Hiding (13th International Workshop) , volume 6958 of Lecture Notes in Computer Science , pages 59 -- 70 , Berlin Heidelberg, 2011 . Springer-Verlag . P. Bas, T. Filler, and T. Pevny. Break our steganographic system | the ins and outs of organizing BOSS. In T. Filler, T. Pevny, S. Craver, and A. Ker, editors, Information Hiding (13th International Workshop), volume 6958 of Lecture Notes in Computer Science, pages 59--70, Berlin Heidelberg, 2011. Springer-Verlag."},{"key":"e_1_3_2_1_4_1","volume-title":"Presentation slides","author":"B\u00f6hme R.","year":"2014","unstructured":"R. B\u00f6hme . Wet paper codes for public key steganography? Unpublished rump session talk at the 7th Information Hiding workshop , Presentation slides available at http:\/\/www1.inf.tu-dresden.de\/~rb21\/publications\/Boehme2005_IHW_RumpSession.pdf (last accessed: April 2014 ), 2005. R. B\u00f6hme. Wet paper codes for public key steganography? Unpublished rump session talk at the 7th Information Hiding workshop, Presentation slides available at http:\/\/www1.inf.tu-dresden.de\/~rb21\/publications\/Boehme2005_IHW_RumpSession.pdf (last accessed: April 2014), 2005."},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-540-88961-8_13","volume-title":"Information Hiding (10th International Workshop)","author":"B\u00f6hme R.","year":"2008","unstructured":"R. B\u00f6hme . Weighted stego-image steganalysis for JPEG covers . In K. Solanki, editor, Information Hiding (10th International Workshop) , volume 5284 of Lecture Notes in Computer Science , pages 178 -- 194 , Berlin Heidelberg, 2008 . Springer-Verlag . R. B\u00f6hme. Weighted stego-image steganalysis for JPEG covers. In K. Solanki, editor, Information Hiding (10th International Workshop), volume 5284 of Lecture Notes in Computer Science, pages 178--194, Berlin Heidelberg, 2008. Springer-Verlag."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14313-7","volume-title":"Advanced Statistical Steganalysis","author":"B\u00f6hme R.","year":"2010","unstructured":"R. B\u00f6hme . Advanced Statistical Steganalysis . Springer-Verlag , Berlin Heidelberg , 1 st edition, 2010 . R. B\u00f6hme. Advanced Statistical Steganalysis. Springer-Verlag, Berlin Heidelberg, 1st edition, 2010.","edition":"1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_7"},{"key":"e_1_3_2_1_8_1","volume-title":"Digital Watermarking and Steganography. Morgan Kaufmann","author":"Cox I.","year":"2007","unstructured":"I. Cox , M. Miller , J. Bloom , J. Fridrich , and T. Kalker . Digital Watermarking and Steganography. Morgan Kaufmann , Burlington, MA , 2 nd edition, 2007 . I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography. Morgan Kaufmann, Burlington, MA, 2nd edition, 2007.","edition":"2"},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology -- CRYPTO '98","author":"Cramer R.","year":"1998","unstructured":"R. Cramer and V. Shoup . A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack . In H. Krawczyk, editor, Advances in Cryptology -- CRYPTO '98 , volume 1462 of Lecture Notes in Computer Science , pages 13 -- 25 , Berlin Heidelberg, 1998 . Springer-Verlag . R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptology -- CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 13--25, Berlin Heidelberg, 1998. Springer-Verlag."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"e_1_3_2_1_11_1","volume-title":"Principles, Algorithms, and Applications","author":"Fridrich J.","year":"2009","unstructured":"J. Fridrich . Steganography in Digital Media . Principles, Algorithms, and Applications . Cambridge University Press , New York, NY, USA , 1 st edition, 2009 . J. Fridrich. Steganography in Digital Media. Principles, Algorithms, and Applications. Cambridge University Press, New York, NY, USA, 1st edition, 2009.","edition":"1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"J.\n      Fridrich\n     and \n      M.\n      Goljan\n  . \n  On estimation of secret message length in LSB steganography in spatial domain\n  . In E. J. Delp and P. W. Wong editors Security Steganography and Watermarking of Multimedia Contents VI volume \n  5306\n   of \n  Proceedings of SPIE pages \n  23\n  --\n  34 San Jose CA 2004\n  . \n  SPIE.  J. Fridrich and M. Goljan. On estimation of secret message length in LSB steganography in spatial domain. In E. J. Delp and P. W. Wong editors Security Steganography and Watermarking of Multimedia Contents VI volume 5306 of Proceedings of SPIE pages 23--34 San Jose CA 2004. SPIE.","DOI":"10.1117\/12.521350"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855393"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"J.\n      Fridrich M.\n      Goljan P.\n      Losin\u00e9k and \n      D.\n      Soukal\n  . \n  Writing on wet paper\n  . In E. J. Delp and P. W. Wong editors Security Steganography\n   and Watermarking of Multimedia Contents VII volume \n  5681\n   of \n  Proceedings of SPIE pages \n  328\n  --\n  340\n  . \n  SPIE San Jose CA 2005\n  .  J. Fridrich M. Goljan P. Losin\u00e9k and D. Soukal. Writing on wet paper. In E. J. Delp and P. W. Wong editors Security Steganography and Watermarking of Multimedia Contents VII volume 5681 of Proceedings of SPIE pages 328--340. SPIE San Jose CA 2005.","DOI":"10.1117\/12.583160"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022431.1022435"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_16"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2007.11"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"A. D.\n      Ker\n     and \n      R.\n      B\u00f6hme\n  . \n  Revisiting weighted stego-image steganalysis\n  . In E. J. Delp P. W. Wong J. Dittmann and N. D. Memon editors Security Forensics Steganography and Watermarking of Multimedia Contents X volume \n  6819\n   of \n  Proceedings of SPIE page \n  681905 San Jose CA 2008\n  . \n  SPIE.  A. D. Ker and R. B\u00f6hme. Revisiting weighted stego-image steganalysis. In E. J. Delp P. W. Wong J. Dittmann and N. D. Memon editors Security Forensics Steganography and Watermarking of Multimedia Contents X volume 6819 of Proceedings of SPIE page 681905 San Jose CA 2008. SPIE.","DOI":"10.1117\/12.766820"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411349"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/645413.652135"},{"key":"e_1_3_2_1_21_1","volume-title":"protocols, algorithms, and source code in C","author":"Schneier B.","year":"1995","unstructured":"B. Schneier . Applied cryptography : protocols, algorithms, and source code in C . John Wiley & Sons, Inc. , New York, NY , 2 nd edition, 1995 . B. Schneier. Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Inc., New York, NY, 2nd edition, 1995.","edition":"2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36373-3_9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412648"},{"key":"e_1_3_2_1_24_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-540-24676-3_20","volume-title":"Proceedings of EUROCRYPT","author":"von Ahn L.","year":"2004","unstructured":"L. von Ahn and N. J. Hopper . Public-key steganography . In C. Cachin and J. L. Camenisch, editors, Proceedings of EUROCRYPT , volume 3027 of Lecture Notes in Computer Science , pages 323 -- 341 , Berlin Heidelberg, 2004 . Springer-Verlag . L. von Ahn and N. J. Hopper. Public-key steganography. In C. Cachin and J. L. Camenisch, editors, Proceedings of EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 323--341, Berlin Heidelberg, 2004. Springer-Verlag."}],"event":{"name":"IH&MMSec '14: ACM Information Hiding and Multimedia Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Salzburg Austria","acronym":"IH&MMSec '14"},"container-title":["Proceedings of the 2nd ACM workshop on Information hiding and multimedia security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600942","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600918.2600942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:39Z","timestamp":1750278159000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600942"}},"subtitle":["steganalysis of public-key steganography using wet paper codes"],"short-title":[],"issued":{"date-parts":[[2014,6,11]]},"references-count":24,"alternative-id":["10.1145\/2600918.2600942","10.1145\/2600918"],"URL":"https:\/\/doi.org\/10.1145\/2600918.2600942","relation":{},"subject":[],"published":{"date-parts":[[2014,6,11]]},"assertion":[{"value":"2014-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}