{"id":"https://openalex.org/W1517527764","doi":"https://doi.org/10.1007/978-3-540-88961-8_14","title":"Practical Insecurity for Effective Steganalysis","display_name":"Practical Insecurity for Effective Steganalysis","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W1517527764","doi":"https://doi.org/10.1007/978-3-540-88961-8_14","mag":"1517527764"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-88961-8_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-88961-8_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072623500","display_name":"Johann Barbier","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128217","display_name":"Metabolism and Renal Physiology","ror":"https://ror.org/0366b1491","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I154526488","https://openalex.org/I159885104","https://openalex.org/I204730241","https://openalex.org/I2746051580","https://openalex.org/I39804081","https://openalex.org/I4210096427","https://openalex.org/I4210128217"]},{"id":"https://openalex.org/I95583923","display_name":"Direction G\u00e9n\u00e9rale de l'Armement","ror":"https://ror.org/04wsqd844","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2799681489","https://openalex.org/I2802818602","https://openalex.org/I95583923"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Johann Barbier","raw_affiliation_strings":["Centre d\u2019\u00c9lectronique de l\u2019ARmement, D\u00e9partement de Cryptologie, La Roche Marguerite, BP 57419, 35174, Bruz Cedex, France","\u00c9cole Sup\u00e9rieure et d\u2019Application des Transmissions, Laboratoire de Virologie et Cryptologie, BP 18, 35998, Rennes Cedex, France","Centre d'\u00c9lectronique de l'ARmement, D\u00e9partement de Cryptologie, La Roche Marguerite, BP 57419, 35174, Bruz Cedex, France"],"affiliations":[{"raw_affiliation_string":"Centre d\u2019\u00c9lectronique de l\u2019ARmement, D\u00e9partement de Cryptologie, La Roche Marguerite, BP 57419, 35174, Bruz Cedex, France","institution_ids":["https://openalex.org/I95583923"]},{"raw_affiliation_string":"\u00c9cole Sup\u00e9rieure et d\u2019Application des Transmissions, Laboratoire de Virologie et Cryptologie, BP 18, 35998, Rennes Cedex, France","institution_ids":["https://openalex.org/I4210128217"]},{"raw_affiliation_string":"Centre d'\u00c9lectronique de l'ARmement, D\u00e9partement de Cryptologie, La Roche Marguerite, BP 57419, 35174, Bruz Cedex, France","institution_ids":["https://openalex.org/I95583923"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074715605","display_name":"St\u00e9phanie Alt","orcid":null},"institutions":[{"id":"https://openalex.org/I95583923","display_name":"Direction G\u00e9n\u00e9rale de l'Armement","ror":"https://ror.org/04wsqd844","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2799681489","https://openalex.org/I2802818602","https://openalex.org/I95583923"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"St\u00e9phanie Alt","raw_affiliation_strings":["Centre d\u2019\u00c9lectronique de l\u2019ARmement, D\u00e9partement de Cryptologie, La Roche Marguerite, BP 57419, 35174, Bruz Cedex, France","Centre d'\u00c9lectronique de l'ARmement, D\u00e9partement de Cryptologie, La Roche Marguerite, BP 57419, 35174, Bruz Cedex, France"],"affiliations":[{"raw_affiliation_string":"Centre d\u2019\u00c9lectronique de l\u2019ARmement, D\u00e9partement de Cryptologie, La Roche Marguerite, BP 57419, 35174, Bruz Cedex, France","institution_ids":["https://openalex.org/I95583923"]},{"raw_affiliation_string":"Centre d'\u00c9lectronique de l'ARmement, D\u00e9partement de Cryptologie, La Roche Marguerite, BP 57419, 35174, Bruz Cedex, France","institution_ids":["https://openalex.org/I95583923"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072623500"],"corresponding_institution_ids":["https://openalex.org/I4210128217","https://openalex.org/I95583923"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2946,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.50796813,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"195","last_page":"208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9826874136924744},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8511673212051392},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7412561178207397},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5973968505859375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5683748722076416},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.4441301226615906},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4404185116291046},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41195663809776306},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3652461767196655}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9826874136924744},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8511673212051392},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7412561178207397},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5973968505859375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5683748722076416},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.4441301226615906},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4404185116291046},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41195663809776306},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3652461767196655}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-88961-8_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-88961-8_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.5099999904632568},{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1479681406","https://openalex.org/W1526973745","https://openalex.org/W1527181506","https://openalex.org/W1583946412","https://openalex.org/W1589421353","https://openalex.org/W1589812914","https://openalex.org/W1878459630","https://openalex.org/W1993947718","https://openalex.org/W1994265736","https://openalex.org/W2017234933","https://openalex.org/W2026463022","https://openalex.org/W2052614332","https://openalex.org/W2106726851","https://openalex.org/W2120024458","https://openalex.org/W2139172211","https://openalex.org/W2161439181","https://openalex.org/W2168850265","https://openalex.org/W2170334586","https://openalex.org/W2497843319","https://openalex.org/W2576355915","https://openalex.org/W2611745365","https://openalex.org/W2619633776","https://openalex.org/W2753819115","https://openalex.org/W4210300416","https://openalex.org/W4245530642","https://openalex.org/W6606999810"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W2792878404","https://openalex.org/W3154843532"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
