Bitspotting: Detecting Optimal Adaptive Steganography. Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., & Böhme, R. In Shi, Y., Kim, H., & Pérez-González, F., editors, Digital Forensics and Watermarking, 12th International Workshop, IWDW 2013, volume 8389, of Lecture Notes in Computer Science, pages 3–18, Berlin Heidelberg, 2014. Springer. bibtex @inproceedings{JSLGB2013-IWDW,
Address = {Berlin Heidelberg},
Author = {Johnson, Benjamin and Sch{\"o}ttle, Pascal and Laszka, Aron and Grossklags, Jens and B{\"o}hme, Rainer},
Booktitle = {Digital Forensics and Watermarking, 12th International Workshop, IWDW 2013},
Date-Added = {2014-02-13 17:47:28 +0100},
Date-Modified = {2015-04-09 20:41:03 +0000},
Editor = {Yun-Qing Shi and Hyoung-Joong Kim and Fernando P{\'e}rez-Gonz{\'a}lez},
Pages = {3--18},
Publisher = {Springer},
Series = {Lecture Notes in Computer Science},
Title = {Bitspotting: {D}etecting Optimal Adaptive Steganography},
Volume = {8389},
Year = {2014}}
Downloads: 0
{"_id":"eheqzC8H9Hts5rYpN","bibbaseid":"johnson-schttle-laszka-grossklags-bhme-bitspottingdetectingoptimaladaptivesteganography-2014","authorIDs":[],"author_short":["Johnson, B.","Schöttle, P.","Laszka, A.","Grossklags, J.","Böhme, R."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"Berlin Heidelberg","author":[{"propositions":[],"lastnames":["Johnson"],"firstnames":["Benjamin"],"suffixes":[]},{"propositions":[],"lastnames":["Schöttle"],"firstnames":["Pascal"],"suffixes":[]},{"propositions":[],"lastnames":["Laszka"],"firstnames":["Aron"],"suffixes":[]},{"propositions":[],"lastnames":["Grossklags"],"firstnames":["Jens"],"suffixes":[]},{"propositions":[],"lastnames":["Böhme"],"firstnames":["Rainer"],"suffixes":[]}],"booktitle":"Digital Forensics and Watermarking, 12th International Workshop, IWDW 2013","date-added":"2014-02-13 17:47:28 +0100","date-modified":"2015-04-09 20:41:03 +0000","editor":[{"firstnames":["Yun-Qing"],"propositions":[],"lastnames":["Shi"],"suffixes":[]},{"firstnames":["Hyoung-Joong"],"propositions":[],"lastnames":["Kim"],"suffixes":[]},{"firstnames":["Fernando"],"propositions":[],"lastnames":["Pérez-González"],"suffixes":[]}],"pages":"3–18","publisher":"Springer","series":"Lecture Notes in Computer Science","title":"Bitspotting: Detecting Optimal Adaptive Steganography","volume":"8389","year":"2014","bibtex":"@inproceedings{JSLGB2013-IWDW,\n\tAddress = {Berlin Heidelberg},\n\tAuthor = {Johnson, Benjamin and Sch{\\\"o}ttle, Pascal and Laszka, Aron and Grossklags, Jens and B{\\\"o}hme, Rainer},\n\tBooktitle = {Digital Forensics and Watermarking, 12th International Workshop, IWDW 2013},\n\tDate-Added = {2014-02-13 17:47:28 +0100},\n\tDate-Modified = {2015-04-09 20:41:03 +0000},\n\tEditor = {Yun-Qing Shi and Hyoung-Joong Kim and Fernando P{\\'e}rez-Gonz{\\'a}lez},\n\tPages = {3--18},\n\tPublisher = {Springer},\n\tSeries = {Lecture Notes in Computer Science},\n\tTitle = {Bitspotting: {D}etecting Optimal Adaptive Steganography},\n\tVolume = {8389},\n\tYear = {2014}}\n\n","author_short":["Johnson, B.","Schöttle, P.","Laszka, A.","Grossklags, J.","Böhme, R."],"editor_short":["Shi, Y.","Kim, H.","Pérez-González, F."],"key":"JSLGB2013-IWDW","id":"JSLGB2013-IWDW","bibbaseid":"johnson-schttle-laszka-grossklags-bhme-bitspottingdetectingoptimaladaptivesteganography-2014","role":"author","urls":{},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://raw.githubusercontent.com/uibk-infsec/website/master/nanoc/bibtex/ours.bib?token=AAHY2PSSM2C4OY6O2ADKHXK6OIK42","creationDate":"2020-03-11T12:36:35.425Z","downloads":0,"keywords":[],"search_terms":["bitspotting","detecting","optimal","adaptive","steganography","johnson","schöttle","laszka","grossklags","böhme"],"title":"Bitspotting: Detecting Optimal Adaptive Steganography","year":2014,"dataSources":["j7JRJgzJFwcssyBtp"]}