{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T18:41:56Z","timestamp":1725820916397},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662467381"},{"type":"electronic","value":"9783662467398"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46739-8_5","type":"book-chapter","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T08:58:09Z","timestamp":1429174689000},"page":"69-91","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Steganography and Steganalysis with Fixed-Size Embedding"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Johnson","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Sch\u00f6ttle","sequence":"additional","affiliation":[]},{"given":"Aron","family":"Laszka","sequence":"additional","affiliation":[]},{"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,17]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-45126-6_7","volume-title":"Financial Cryptography","author":"A Acquisti","year":"2003","unstructured":"Acquisti, A., Dingledine, R., Syverson, P.F.: On the economics of anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84\u2013102. Springer, Heidelberg (2003)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-61996-8_30","volume-title":"Information Hiding","author":"R Anderson","year":"1996","unstructured":"Anderson, R.: Stretching the limits of steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 39\u201348. Springer, Heidelberg (1996)"},{"issue":"3","key":"5_CR3","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/TIFS.2012.2237397","volume":"8","author":"M Barni","year":"2013","unstructured":"Barni, M., Tondi, B.: The source identification game: an information-theoretic perspective. IEEE Trans. Inf. Forensics Secur. 8(3), 450\u2013463 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14313-7","volume-title":"Advanced Statistical Steganalysis","author":"R B\u00f6hme","year":"2010","unstructured":"B\u00f6hme, R.: Advanced Statistical Steganalysis. Springer, Berlin (2010)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-540-30114-1_7","volume-title":"Information Hiding","author":"R B\u00f6hme","year":"2004","unstructured":"B\u00f6hme, R., Westfeld, A.: Exploiting preserved statistics for steganalysis. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 82\u201396. Springer, Heidelberg (2004)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-25280-8_16","volume-title":"Decision and Game Theory for Security","author":"PH Chia","year":"2011","unstructured":"Chia, P.H., Chuang, J.: Colonel Blotto in the phishing war. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 201\u2013218. Springer, Heidelberg (2011)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Denemark, T., Fridrich, J.: Detection of content adaptive LSB matching: a game theory approach. In: Alattar, A., Memon, N., Heitzenrater, C. (eds.) Proceedings SPIE, Media Watermarking, Security, and Forensics, vol. 9028, p. 902804. SPIE and IS&T (2014)","DOI":"10.1117\/12.2040418"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/3-540-49380-8_22","volume-title":"Information Hiding","author":"JM Ettinger","year":"1998","unstructured":"Ettinger, J.M.: Steganalysis and game equilibria. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 319\u2013328. Springer, Heidelberg (1998)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-36415-3_18","volume-title":"Information Hiding","author":"E Franz","year":"2003","unstructured":"Franz, E.: Steganography preserving statistical properties. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 278\u2013294. Springer, Heidelberg (2003)"},{"key":"5_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Delp, E., Wong, P. (eds.) Proceedings SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 23\u201334. SPIE (2004)","DOI":"10.1117\/12.521350"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Kodovsky, J.: Multivariate Gaussian model for designing additive distortion for steganography. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, BC, pp. 2949\u20132953, May 2013","DOI":"10.1109\/ICASSP.2013.6638198"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/10719724_4","volume-title":"Information Hiding","author":"J Fridrich","year":"2000","unstructured":"Fridrich, J., Du, R.: Secure steganographic methods for palette images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47\u201360. Springer, Heidelberg (2000)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: A game-theoretic analysis of information security games. In: Proceedings of the 17th International World Wide Web Conference (WWW), Beijing, China, pp. 209\u2013218, April 2008","DOI":"10.1145\/1367497.1367526"},{"issue":"5","key":"5_CR15","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo, L., Ni, J., Shi, Y.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814\u2013825 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.entcs.2004.07.010","volume":"119","author":"L H\u00e9lou\u00ebt","year":"2005","unstructured":"H\u00e9lou\u00ebt, L., Zeitoun, M., Degorre, A.: Scenarios and covert channels: another game. Electron. Notes Theor. Comput. Sci. 119(1), 93\u2013116 (2005)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25280-8_11","volume-title":"Decision and Game Theory for Security","author":"B Johnson","year":"2011","unstructured":"Johnson, B., B\u00f6hme, R., Grossklags, J.: Security games with market insurance. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 117\u2013130. Springer, Heidelberg (2011)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-34266-0_1","volume-title":"Decision and Game Theory for Security","author":"B Johnson","year":"2012","unstructured":"Johnson, B., Sch\u00f6ttle, P., B\u00f6hme, R.: Where to hide the bits? In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 1\u201317. Springer, Heidelberg (2012)"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-43886-2_1","volume-title":"Digital-Forensics and Watermarking","author":"B Johnson","year":"2014","unstructured":"Johnson, B., Sch\u00f6ttle, P., Laszka, A., Grossklags, J., B\u00f6hme, R.: Bitspotting: detecting optimal adaptive steganography. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 3\u201318. Springer, Heidelberg (2014)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Ker, A.: Batch steganography and the threshold game. In: Delp, E., Wong, P. (eds.) Proceedings SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 0401\u20130413. SPIE (2007)","DOI":"10.1117\/12.703334"},{"issue":"4","key":"5_CR21","first-page":"33","volume":"5","author":"A Laszka","year":"2013","unstructured":"Laszka, A., Foldes, A.: Modeling content-adaptive steganography with detection costs as a quasi-zero-sum game. Infocomm. J. 5(4), 33\u201343 (2013)","journal-title":"Infocomm. J."},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-40203-6_16","volume-title":"Computer Security \u2013 ESORICS 2013","author":"A Laszka","year":"2013","unstructured":"Laszka, A., Johnson, B., Sch\u00f6ttle, P., Grossklags, J., B\u00f6hme, R.: Managing the weakest link. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 273\u2013290. Springer, Heidelberg (2013)"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-25280-8_8","volume-title":"Decision and Game Theory for Security","author":"P Maill\u00e9","year":"2011","unstructured":"Maill\u00e9, P., Reichl, P., Tuffin, B.: Interplay between security providers, consumers, and attackers: a weighted congestion game approach. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 67\u201386. Springer, Heidelberg (2011)"},{"issue":"4","key":"5_CR24","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TSP.2003.809370","volume":"51","author":"P Moulin","year":"2003","unstructured":"Moulin, P., Ivanovic, A.: The zero-rate spread-spectrum watermarking game. IEEE Trans. Signal Process. 51(4), 1098\u20131117 (2003)","journal-title":"IEEE Trans. Signal Process."},{"issue":"2","key":"5_CR25","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J Nash","year":"1951","unstructured":"Nash, J.: Non-cooperative games. Ann. Math. 54(2), 286\u2013295 (1951)","journal-title":"Ann. Math."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Orsdemir, A., Altun, O., Sharma, G., Bocko, M.: Steganalysis-aware steganography: statistical indistinguishability despite high distortion. In: Delp, E., Wong, P., Dittmann, J., Memon, N. (eds.) Proceedings SPI, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, p. 681915. SPIE (2008)","DOI":"10.1117\/12.767402"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Petitcolas, F.: Introduction to information hiding. In: Katzenbeisser, S., Petitcolas, F. (eds.) Information Hiding Techniques for Steganography and Digital Watermarking, Recent Titles in the Artech House Computer Security Series, pp. 1\u201314. Artech House, Boston (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Information Hiding","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161\u2013177. Springer, Heidelberg (2010)"},{"issue":"1","key":"5_CR29","first-page":"43","volume":"30","author":"J Pita","year":"2009","unstructured":"Pita, J., Jain, M., Ord\u00f3nez, F., Portway, C., Tambe, M., Western, C., Paruchuri, P., Kraus, S.: Using game theory for Los Angeles airport security. AI Mag. 30(1), 43\u201357 (2009)","journal-title":"AI Mag."},{"key":"5_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-36373-3_9","volume-title":"Information Hiding","author":"P Sch\u00f6ttle","year":"2013","unstructured":"Sch\u00f6ttle, P., B\u00f6hme, R.: A game-theoretic approach to content-adaptive steganography. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 125\u2013141. Springer, Heidelberg (2013)"},{"key":"5_CR31","unstructured":"Sch\u00f6ttle, P., Laszka, A., Johnson, B., Grossklags, J., B\u00f6hme, R.: A game-theoretic analysis of content-adaptive steganography with independent embedding. In: Proceedings of the 21st European Signal Processing Conference (EUSIPCO), Marrakech, Morocco, September 2013"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Stamm, M., Lin, W., Liu, K.: Forensics vs. anti-forensics: a decision and game theoretic framework. In: Proceedings of the 2012 IEEE International Conference on Acoustics. Speech and Signal Processing (ICASSP), Kyoto, Japan, pp. 1749\u20131752, March 2012","DOI":"10.1109\/ICASSP.2012.6288237"},{"key":"5_CR33","volume-title":"Theory of Games and Economic Behavior","author":"J von Neumann","year":"1944","unstructured":"von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Data Hiding and Multimedia Security X"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46739-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T00:22:36Z","timestamp":1676938956000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-46739-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662467381","9783662467398"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46739-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}