{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:51:50Z","timestamp":1725475910221},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540482697"},{"type":"electronic","value":"9783540482727"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11915034_56","type":"book-chapter","created":{"date-parts":[[2006,11,29]],"date-time":"2006-11-29T23:40:30Z","timestamp":1164843630000},"page":"322-330","source":"Crossref","is-referenced-by-count":2,"title":["Using Image Steganography for Decryptor Distribution"],"prefix":"10.1007","author":[{"given":"T.","family":"Morkel","sequence":"first","affiliation":[]},{"given":"J. H. P.","family":"Eloff","sequence":"additional","affiliation":[]},{"given":"M. S.","family":"Olivier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","unstructured":"Dunbar, B.: Steganographic techniques and their use in an Open-Systems environment. SANS Institute (January 2002)"},{"key":"56_CR2","doi-asserted-by":"crossref","unstructured":"Jamil, T.: Steganography: The art of hiding information is plain sight. IEEE Potentials 18(01) (1999)","DOI":"10.1109\/45.747237"},{"key":"56_CR3","unstructured":"Silman, J.: Steganography and Steganalysis: An Overview. SANS Institute (2001)"},{"key":"56_CR4","doi-asserted-by":"crossref","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Proceedings of the 2nd Information Hiding Workshop (April 1998)","DOI":"10.1007\/3-540-49380-8_19"},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, S.: Cyber warfare: Steganography vs. Steganalysis. Communications of the ACM\u00a047(10) (October 2004)","DOI":"10.1145\/1022594.1022597"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis: The Investigation of Hidden Information. In: Proceedings of the IEEE Information Technology Conference (1998)","DOI":"10.1109\/IT.1998.713394"},{"key":"56_CR7","unstructured":"Krenn, R.: Steganography and Steganalysis, http:\/\/www.krenn.nl\/univ\/cry\/steg\/article.pdf"},{"key":"56_CR8","unstructured":"Morkel, T., Eloff, J.H.P., Olivier, M.S.: An overview of Image Steganography. In: Proceedings of the Information Security South Africa (ISSA) Conference (2005)"},{"key":"56_CR9","doi-asserted-by":"crossref","unstructured":"Rubin, A.D., Geer, D.E.: Mobile Code Security. IEEE Internet Journal (December 1998)","DOI":"10.1109\/4236.735984"},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of Executable Code to Improve Resistance to Static Disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)","DOI":"10.1145\/948109.948149"},{"key":"56_CR11","unstructured":"Obfuscated code, Wikipedia online encyclopedia (accessed on July 6, 2007), http:\/\/www.wikipedia.org\/wiki\/Obfuscated_code"},{"key":"56_CR12","unstructured":"Tudor, J.K.: Information Security Architecture: An Integrated Approach to Security in the Organization. Auerbach Publications (2001)"},{"key":"56_CR13","doi-asserted-by":"crossref","unstructured":"Artz, D.: Digital Steganography: Hiding Data within Data. IEEE Internet Computing Journal (June 2001)","DOI":"10.1109\/4236.935180"},{"key":"56_CR14","volume-title":"Principles of Computer Security: Security+ and Beyond","author":"A. Conklin","year":"2004","unstructured":"Conklin, A., White, G.B., Cothren, C., Williams, D., Davis, R.L.: Principles of Computer Security: Security+ and Beyond. McGraw-Hill Technology Education, New York (2004)"},{"key":"56_CR15","unstructured":"Schneier, B.: Security in the Real World: How to Evaluate Security Technology. Computer Security Journal 4 (1999)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11915034_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:41:03Z","timestamp":1619509263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11915034_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540482697","9783540482727"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11915034_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}