{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:45:04Z","timestamp":1694637904525},"reference-count":27,"publisher":"Maria Curie-Sklodowska University","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1,1]]},"DOI":"10.2478\/v10065-008-0025-1","type":"journal-article","created":{"date-parts":[[2009,12,26]],"date-time":"2009-12-26T04:16:58Z","timestamp":1261801018000},"source":"Crossref","is-referenced-by-count":0,"title":["New steerable pyramid steganography algorithm resistant to the Fisher Linear Discriminant steganalysis"],"prefix":"10.17951","volume":"8","author":[{"given":"Piotr","family":"Kopniak","sequence":"first","affiliation":[]}],"member":"7349","reference":[{"key":"1","unstructured":"Davern P., Scott M., <i>Steganography: its history and its application to computer based data files<\/i>, Workomg Papers, CA-0795, School of Computing, Dublin City University (1995)."},{"key":"2","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000"},{"key":"3","volume-title":"Podstawy ochrony informacji, (a cooperation author of chapter 3 - Kopniak P.)","author":"W. Garbarczuk","year":"2005"},{"key":"4","volume-title":"Por\u00f3wnanie odporno\u015bci na zniekszta\u0142cenia danych ukrytych w obrazie metod\u0105 LSB i metod\u0105 modyfikacji widma","author":"P. Kopniak","year":"2004"},{"key":"5","volume-title":"Robustness of Data Hidding in Image Fourier Spectrum","author":"P. Kopniak","year":"2006"},{"key":"6","article-title":"Wykorzystanie transformacji obrazu do przestrzeni cz\u0119stotliwo\u015bciowej w steganografii, VI Mi\u0119dzynarodowe Warsztaty Doktoranckie, OWD 2004 - Wis\u0142a, 16-19 pa\u017adziernika 2004","volume":"19","author":"P. Kopniak","year":"2004","journal-title":"Archiwum Konferencji PTETiS"},{"key":"7","volume-title":"Metody cyfrowego przetwarzania sygna\u0142\u00f3w na potrzeby steganologii komputerowej","author":"P. Kopniak","year":"2007"},{"key":"8","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1109\/34.93808","article-title":"<i>The Design and Use of Steerable Filters<\/i>","volume":"9","author":"W. Freeman","year":"1991","journal-title":"IEEE Trans. Patt. Anal. and Machine Intell"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1109\/ICASSP.1996.547763","article-title":"A Filter Design Technique for Steerable Pyramid Image Transforms","author":"A. Karasaridis","year":"1996"},{"key":"10","first-page":"444","article-title":"The Steerable Pyramid: A Flexible Architecture For Multi-Scale Derivative Computation","author":"E. Simoncelli","year":"1995"},{"key":"11","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/18.119725","article-title":"<i>Shiftable Multi-scale Transforms<\/i>","volume":"2","author":"E. Simoncelli","year":"1992","journal-title":"IEEE Trans. Information Theory"},{"key":"12","first-page":"275","article-title":"A Secure Robust Image Steganographic Model","author":"Y. Lee","year":"2000"},{"key":"13","volume-title":"Disappearing Cryptography. Information Hiding: Steganography & Watermarking","author":"P. Wayner","year":"2002"},{"key":"14","unstructured":"Machado R., EzStego <a target=\"_blank\" href='http:\/\/www.stego.com'>http:\/\/www.stego.com<\/a>"},{"key":"15","unstructured":"Westfeld A., F5 <a target=\"_blank\" href='http:\/\/wwwrn.inf.tu-dresden.de\/westfeld\/F5.html'>http:\/\/wwwrn.inf.tu-dresden.de\/westfeld\/F5.html<\/a>"},{"key":"16","doi-asserted-by":"crossref","unstructured":"Johnson N. F., Jajodia S., <i>Steganalysis of Images Created Using Current Steganography Software<\/i>, Centre for Secure Information Systems, George Mason University, Fairfax, Virginia, Information Hiding, Second International Workshop, IH'98 Portland, Oregon, USA, April (1998) 273.","DOI":"10.1007\/3-540-49380-8_19"},{"key":"17","volume-title":"Attacks on Steganographic Systems - Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - and Some Lessons Learned","author":"A. Westfield","year":"2000"},{"key":"18","first-page":"1","article-title":"Practical Steganalysis: State of the Art","volume":"4675","author":"J. Fridrich","year":"2002","journal-title":"SPIE"},{"key":"19","unstructured":"Dygnarowicz R., <i>Steganografia<\/i>, ENIGMA 2000 - IV Krajowa Konferencja Zastosowa\u0144 Kryptografii, Warszawa (2000)."},{"key":"20","first-page":"1884","volume-title":"Wavelet-based steganalysis using a computational immune system approach","author":"J. Jackson","year":"2003"},{"key":"21","article-title":"Detecting hidden messages using higher-order ststistical models","author":"H. Farid","year":"2002"},{"key":"22","unstructured":"Upham D., Jpeg-Jsteg <a target=\"_blank\" href='http:\/\/ftp:\/\/ftp.funet.fi\/pub\/crypt\/steganography\/'>ftp:\/\/ftp.funet.fi\/pub\/crypt\/steganography\/<\/a>"},{"key":"23","unstructured":"Provos N., Outguess <a target=\"_blank\" href='http:\/\/www.outguess.org'>http:\/\/www.outguess.org<\/a>"},{"key":"24","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","article-title":"<i>The use of multiple measures in taxonomic problems.<\/i>","volume":"7","author":"R. Fisher","year":"1936","journal-title":"Annals of Eugenics"},{"key":"25","first-page":"474","article-title":"Theory and Design of Multidimensional QMF Subband Filters From 1-D Filters Using Transforms","author":"I. Shah","year":"1992"},{"key":"26","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1109\/18.476343","article-title":"<i>Information-theoretic performance of quadrature mirror filters<\/i>","volume":"41","author":"A. Divakaran","year":"1995","journal-title":"IEEE Transactions on Information Theory"},{"key":"27","unstructured":"FreeFoto <a target=\"_blank\" href='http:\/\/www.freefoto.com'>www.freefoto.com<\/a>"}],"container-title":["Annales UMCS, Informatica"],"original-title":[],"link":[{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/download\/3240\/2436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T15:47:22Z","timestamp":1653493642000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/view\/3240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,1]]},"references-count":27,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.2478\/v10065-008-0025-1","relation":{},"ISSN":["2083-3628","1732-1360"],"issn-type":[{"value":"2083-3628","type":"electronic"},{"value":"1732-1360","type":"print"}],"subject":[],"published":{"date-parts":[[2008,1,1]]}}}