{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:53:31Z","timestamp":1725472411169},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494621"},{"type":"electronic","value":"9783540494638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935070_16","type":"book-chapter","created":{"date-parts":[[2006,11,13]],"date-time":"2006-11-13T02:25:27Z","timestamp":1163384727000},"page":"224-240","source":"Crossref","is-referenced-by-count":2,"title":["Steganalysis Based on Differential Statistics"],"prefix":"10.1007","author":[{"given":"Zugen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lingdi","family":"Ping","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jimin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xuezeng","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. SPIE Electronic Imaging, Santa Clara, CA, January 21-24, vol.\u00a05022, pp. 131\u2013142 (2003)","DOI":"10.1117\/12.476813"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Harmsen, J.J., Bowers, K.D., Pearlman, W.A.: Fast Additive Noise Steganalysis. In: Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19-22, pp. 489\u2013495 (2004)","DOI":"10.1117\/12.526003"},{"issue":"12","key":"16_CR3","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., et al.: Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Transaction on Image Processing"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Piva, A., Barni, M., Bartolini, E., et al.: DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of 4th IEEE International Conference on Image Processing ICIP 1997, Atlanta, USA, pp. 520\u2013523 (1997)","DOI":"10.1109\/ICIP.1997.647964"},{"issue":"6","key":"16_CR5","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"A. Ker","year":"2005","unstructured":"Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE. Signal Processing Letters\u00a012(6), 441\u2013444 (2005)","journal-title":"IEEE. Signal Processing Letters"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Xuan, G., Zou, D., Gao, J., Yang, C., Zhang, Z., Chai, P., Chen, W., Chen, C.: Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-Error Image, and Neural Network. In: Proc. ICME 2005, Amsterdam, Netherlands, July 6-8, pp. 269\u2013272 (2005)","DOI":"10.1109\/ICME.2005.1521412"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-36415-3_22","volume-title":"Information Hiding","author":"S. Lyu","year":"2003","unstructured":"Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 340\u2013354. Springer, Heidelberg (2003)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/11551492_4","volume-title":"Digital Watermarking","author":"T. Pevny","year":"2005","unstructured":"Pevny, T., Fridrich, J.: Towards Multi-class Blind Steganalyzer for JPEG Images. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 39\u201353. Springer, Heidelberg (2005)"},{"key":"16_CR10","unstructured":"Upham, D.: Jsteg. ftp.funet.fi"},{"key":"16_CR11","unstructured":"Westfeld, A.: F5, http:\/\/wwwrn.inf.tu-dresden.de\/"},{"key":"16_CR12","unstructured":"Provos, N.: http:\/\/Outguess.www.outguess.org\/"},{"issue":"1","key":"16_CR13","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P. Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics\u00a05(1), 167\u2013189 (2005)","journal-title":"International Journal of Image and Graphics"},{"key":"16_CR14","unstructured":"Hetzl, S.: http:\/\/steghide.sourceforge.net\/"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-30108-0_8","volume-title":"Computer Security \u2013 ESORICS 2004","author":"R. Bohme","year":"2004","unstructured":"Bohme, R., Westfeld, A.: Breaking cauchy model-based. jpeg steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 125\u2013140. Springer, Heidelberg (2004)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines. In: Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19-22, pp. 35\u201345 (2004)","DOI":"10.1117\/12.526012"},{"key":"16_CR17","unstructured":"http:\/\/www.corel.com\/"},{"key":"16_CR18","unstructured":"http:\/\/www.cs.washington.edu\/"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-24624-4_3","volume-title":"Digital Watermarking","author":"R. Chandramouli","year":"2004","unstructured":"Chandramouli, R., Kharrazi, M., Memon, N.D.: Image Steganography and Steganalysis: Concepts and Practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 35\u201349. Springer, Heidelberg (2004)"},{"issue":"4","key":"16_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"34","author":"G. Wallace","year":"1991","unstructured":"Wallace, G.: The JPEG Still Picture Compression Standard. Communications of the ACM\u00a034(4), 30\u201344 (1991)","journal-title":"Communications of the ACM"},{"key":"16_CR21","unstructured":"Chih-Chung, C., Chih-Jen, L.: LIBSVM: a library for support vector machines (2001), http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"16_CR22","first-page":"768","volume":"1","author":"Y.Q. Shi","year":"2005","unstructured":"Shi, Y.Q., Xuan, G., Yang, C., Gao, J., Zhang, Z., Chai, P., Zou, D., Chen, C., Chen, W.: Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. ITCC\u00a0(1), 768\u2013773 (2005)","journal-title":"ITCC"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935070_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:47:53Z","timestamp":1619495273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935070_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494621","9783540494638"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11935070_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}