{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:10:49Z","timestamp":1725495049709},"publisher-location":"New York, NY","reference-count":18,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387737416"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73742-3_13","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T10:45:53Z","timestamp":1194950753000},"page":"193-204","source":"Crossref","is-referenced-by-count":6,"title":["Detecting Steganography Using Multi-Class Classification"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Rodriguez","sequence":"first","affiliation":[]},{"given":"Gilbert","family":"Peterson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"S. Agaian and H. Cai, Color wavelet based universal blind steganalysis, presented at the International Workshop on Spectral Methods and Multirate Signal Processing, 2004.","key":"13_CR1"},{"issue":"12","key":"13_CR2","doi-asserted-by":"publisher","first-page":"1688","DOI":"10.1109\/83.806616","volume":"8","author":"R. Buccigrossi","year":"1999","unstructured":"R. Buccigrossi and E. Simoncelli, Image compression via joint statistical characterization in the wavelet domain, IEEE Transactions on Image Processing, vol. 8(12), pp. 1688\u20131701, 1999.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"2","key":"13_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C. Burges","year":"1998","unstructured":"C. Burges, A tutorial on support vector machines for pattern recognition, Data Mining and Knowledge Discovery, vol. 2(2), pp. 121\u2013167, 1998.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"13_CR4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801389","volume-title":"An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods","author":"N. Cristianini","year":"2000","unstructured":"N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods, Cambridge University Press, Cambridge, United Kingdom, 2000."},{"doi-asserted-by":"crossref","unstructured":"J. Fridrich, G. Miroslav and H. Dorin, New methodology for breaking steganographic techniques for JPEGs, Proceedings of the SPIE Symposium on Electronic Imaging, pp. 143\u2013155, 2003.","key":"13_CR5","DOI":"10.1117\/12.473142"},{"issue":"3","key":"13_CR6","first-page":"75","volume":"153","author":"J. Fridrich","year":"2006","unstructured":"J. Fridrich and T. Pevny, Determining the stego algorithm for JPEG images, IEE Proceedings, vol. 153(3), pp. 75\u2013139, 2006.","journal-title":"IEE Proceedings"},{"key":"13_CR7","first-page":"785","volume-title":"Advances in Neural Information Systems 15","author":"S. Har-Peled","year":"2003","unstructured":"S. Har-Peled, D. Roth and D. Zimak, Constraint classification for multiclass classification and ranking, in Advances in Neural Information Systems 15, S. Becker, S. Thrun and K. Obermayer (Eds.), MIT Press, Cambridge, Massachusetts, pp. 785\u2013792, 2003."},{"unstructured":"S. Hetzl, StegHide ( http:\/\/steghide.sourceforge.net ).","key":"13_CR8"},{"unstructured":"C. Hsu, C. Chang and C. Lin, A practical guide to support vector classification ( http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf ), 2005.","key":"13_CR9"},{"unstructured":"T. Lane, P. Gladstone, L. Ortiz, L. Crocker, G. Weijers and other members of the Independent JPEG Group, JSteg ( http:\/\/www.stegoarchive.com ).","key":"13_CR10"},{"doi-asserted-by":"crossref","unstructured":"S. Lyu and H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, Proceedings of the SPIE Symposium on Electronic Imaging, 2004.","key":"13_CR11","DOI":"10.1117\/12.526012"},{"key":"13_CR12","first-page":"547","volume-title":"Advances in Neural Information Systems 12","author":"J. Platt","year":"2000","unstructured":"J. Platt, N. Cristianini and J. Shawe-Taylor, Large margin DAGs for multiclass classification, in Advances in Neural Information Systems 12, S. Solla, T. Leen and K. Muller (Eds.), MIT Press, Cambridge, Massachusetts, pp. 547\u2013553, 2000."},{"unstructured":"N. Provos, OutGuess ( http:\/\/www.outguess.org ).","key":"13_CR13"},{"doi-asserted-by":"crossref","unstructured":"P. Sallee, Model-based steganography, Proceedings of the Second International Workshop on Digital Watermarking, pp. 154\u2013167, 2003.","key":"13_CR14","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"13_CR15","volume-title":"Learning with Kernels: Support Vector Machines, Regularization, Optimization and Beyond","author":"B. Scholkopf","year":"2002","unstructured":"B. Scholkopf and A. Smola, Learning with Kernels: Support Vector Machines, Regularization, Optimization and Beyond, MIT Press, Cambridge, Massachusetts, 2002."},{"unstructured":"StegoArchive.com ( http:\/\/www.stegoarchive.com ).","key":"13_CR16"},{"doi-asserted-by":"crossref","unstructured":"A. Tewari and P. Bartlett, On the consistency of multiclass classification methods, Proceedings of the Eighteenth Annual Conference on Learning Theory, pp. 143\u2013157, 2005.","key":"13_CR17","DOI":"10.1007\/11503415_10"},{"doi-asserted-by":"crossref","unstructured":"A. Westfeld, F5 \u2014A steganographic algorithm, Proceedings of the Fourth International Workshop on Information Hiding, pp. 289\u2013302, 2001.","key":"13_CR18","DOI":"10.1007\/3-540-45496-9_21"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:17:14Z","timestamp":1619669834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387737416"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_13","relation":{},"subject":[]}}