{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:05:04Z","timestamp":1750219504509,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1145\/3733102.3733128","type":"proceedings-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:07Z","timestamp":1750158847000},"page":"108-113","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["How (Not) to Build Dual-Regev Covert Channel"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0268-0500","authenticated-orcid":false,"given":"Hoover H. F.","family":"Yin","sequence":"first","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0443-2041","authenticated-orcid":false,"given":"Harry W. H.","family":"Wong","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16342-5_7"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14791-3_10"},{"key":"e_1_3_3_2_4_2","volume-title":"Discussion on the Full Entropy Assumption of the SP 800-90 Series","author":"Buller Darryl","year":"2023","unstructured":"Darryl Buller, Aaron Kaufer, Allen Roginsky, and Meltem S\u00f6nmez\u00a0Turan. 2023. Discussion on the Full Entropy Assumption of the SP 800-90 Series. Technical Report. NIST Interagency Report 8427."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_21"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711444"},{"key":"e_1_3_3_2_7_2","first-page":"38","volume-title":"Media Forensics and Security II","author":"Filler Tom\u00e1\u0161","year":"2010","unstructured":"Tom\u00e1\u0161 Filler, Jan Judas, and Jessica Fridrich. 2010. Minimizing embedding impact in steganography using trellis-coded quantization. In Media Forensics and Security II, Vol.\u00a07541. SPIE, 38\u201351."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45374-9_21"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_14"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24638-1_9"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_17"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_13"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_8"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Daniele Micciancio and Oded Regev. 2007. Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37 1 (2007) 267\u2013302.","DOI":"10.1137\/S0097539705447360"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_5"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_29"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Oded Regev. 2004. New lattice-based cryptographic constructions. Journal of the ACM (JACM) 51 6 (2004) 899\u2013942.","DOI":"10.1145\/1039488.1039490"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Oded Regev. 2009. On lattices learning with errors random linear codes and cryptography. Journal of the ACM (JACM) 56 6 (2009) 1\u201340.","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3055504.3055509"}],"event":{"name":"IH&MMSEC '25: ACM Workshop on Information Hiding and Multimedia Security","location":"San Jose USA","acronym":"IH&MMSEC '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:42Z","timestamp":1750158882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733102.3733128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":21,"alternative-id":["10.1145\/3733102.3733128","10.1145\/3733102"],"URL":"https:\/\/doi.org\/10.1145\/3733102.3733128","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-06-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}