{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:14:01Z","timestamp":1725664441226},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540619963"},{"type":"electronic","value":"9783540495895"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61996-8_46","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T17:30:36Z","timestamp":1330277436000},"page":"265-278","source":"Crossref","is-referenced-by-count":21,"title":["Practical invisibility in digital communication"],"prefix":"10.1007","author":[{"given":"Tuomas","family":"Aura","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"volume-title":"Invisible communication","year":"1995","author":"T. Aura","key":"20_CR1","unstructured":"Tuomas Aura. Invisible communication. In Proceedings of the HUT Seminar on Network Security '95, Espoo, Finland, November 1995. Telecommunications Software and Multimedia laboratory, Helsinki University of Technology."},{"key":"20_CR2","first-page":"338","volume":"6","author":"H. Federrath","year":"1995","unstructured":"Hannes Federrath and J\u00fcrgen Thees. Schutz der Vertraulichkeit des Aufenhaltsorts von Mobilfunkteilnehmern. Datenschutz und Datensicherung, (6):338\u2013348, June 1995.","journal-title":"Datenschutz und Datensicherung"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Maxwell T. Sandford II, Jonathan N. Bradley, and Theodore G. Handel. The data embedding method. In Proceedings of the SPIE Photonics East Conference, Philadelphia, September 1995.","DOI":"10.2172\/249252"},{"key":"20_CR4","unstructured":"Paul C. Kocher. Personal communication, October 1995."},{"issue":"2","key":"20_CR5","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"Michael Luby and Charles Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373\u2013386, April 1988.","journal-title":"SIAM Journal on Computing"},{"key":"20_CR6","first-page":"318","volume":"6","author":"S. M\u00f6ller","year":"1994","unstructured":"Steffen M\u00f6ller, Andreas Pfitzmann, and Ingo Stierand. Rechnergst\u00fctzte Steganographie: Wie sie funktioniert und warum folglich jede Reglementierung von Verschl\u00fcsselung unsinnig ist. Dateschutz und Datensicherung, (6):318\u2013326, June 1994.","journal-title":"Dateschutz und Datensicherung"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61996-8_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:11:24Z","timestamp":1605629484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61996-8_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540619963","9783540495895"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-61996-8_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}