{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:28:10Z","timestamp":1742934490143,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":22,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441903112"},{"type":"electronic","value":"9781441903129"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-1-4419-0312-9_22","type":"book-chapter","created":{"date-parts":[[2009,10,19]],"date-time":"2009-10-19T16:06:33Z","timestamp":1255968393000},"page":"339-353","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Novel Blind Steganalysis for JPEG Images"],"prefix":"10.1007","author":[{"given":"Li","family":"Zhuo","sequence":"first","affiliation":[]},{"given":"Chen","family":"Jian","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Xiaoning","sequence":"additional","affiliation":[]},{"given":"Zeng","family":"Xianting","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Xuezeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,30]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Proceedings of the 5th Information Hiding Workshop, Lecture Notes in Computer Science, pp.310\u2013323 (2002)","DOI":"10.1007\/3-540-36415-3_20"},{"key":"22_CR2","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Attacking the Outguess. In: ACM Multimedia 2002 Workshop W2 - Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis, pp.3\u20136 (2002)"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1016\/S0165-1684(03)00169-5","volume":"83","author":"T. Zhang","year":"2003","unstructured":"Zhang, T., Ping, X. J.: A new approach to reliable detection of LSB steganography in natural images. Signal Process, 83:2085\u201493 (2003)","journal-title":"Signal Process"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Avcibas, I., Memon, N., Sankur, B.: Steganalysis Based on Image Quality Metrics. In: IEEE 4th Workshop on Multimedia Signal Processing, pp.517\u2014522 (2001)","DOI":"10.1109\/MMSP.2001.962785"},{"key":"22_CR5","first-page":"2749","volume":"17","author":"I. Avcibas","year":"2005","unstructured":"Avcibas, I., Khrrazi, M., Memon, N., Sankur, B.: Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing, 17, pp.2749\u20142757 (2005)","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Proc. of 5th International Workshop on Information Hiding, pp.340\u2014354 (2002)","DOI":"10.1007\/3-540-36415-3_22"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Harmsen, J.J., Pearlman, W.A.: Steganalysis of Additive Noise Modelable Information Hiding. In: Proceedings of SPIE - The International Society for Optical Engineering, v.5020, pp.131\u2014142 (2003)","DOI":"10.1117\/12.476813"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Feature-based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. In: Proc. 6th Int. Information Hiding Workshop, pp.67\u201481 (2004)","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Fu, D.D., Shi, Y.Q, Zou, D.K., Xuan, G.R.: JPEG steganalysis using empirical transition matrix in block DCT domain. In: IEEE 8th International Workshop on Multimedia Signal Processing, pp.310-313 (2006).","DOI":"10.1109\/MMSP.2006.285320"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Chen, C.H., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Proc. of the 8th Information Hiding Workshop, pp.249-264 (2007).","DOI":"10.1007\/978-3-540-74124-4_17"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Chen, C.H., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: IEEE International Symposium on Circuits and Systems, pp.3029-3032(2008).","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Proc. of 8th International Workshop on Information Hiding, pp.249\u2014264 (2006)","DOI":"10.1007\/978-3-540-74124-4_17"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5-a steganographic algorithm: high capacity despite better steganalysis. In: Proc. of the 4th Information Hiding Workshop, pp.289-302 (2001).","DOI":"10.1007\/3-540-45496-9_21"},{"key":"22_CR14","unstructured":"Jsteg, http:\/\/ftp.funet.fi\/pub\/crypt\/steganography\/."},{"key":"22_CR15","unstructured":"Jphide&Seek, http:\/\/linux01.gwdg.de\/\u223calatham\/stego.html."},{"key":"22_CR16","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proc. of the 10th Usenix Security Symposium, pp.323-335 (2001)."},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Stefan, H., Petra, M.A.: graph-theoretic approach to steganography. In: Proc of the 9th IFIP TC-6 TC-11 International Conference, pp.119-128 (2005).","DOI":"10.1007\/11552055_12"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Sallee, P.: Model based steganography. In: Proc. of the 2nd International Workshop on Digital Watermarking, pp.154\u2013167 (2004).","DOI":"10.1007\/978-3-540-24624-4_12"},{"issue":"1","key":"22_CR19","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P. Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics, 5(1) pp.167-189 (2005).","journal-title":"International Journal of Image and Graphics"},{"key":"22_CR20","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-Vector Networks. Machine Learning, vol.20, pp. 273\u2014297 (1995)","journal-title":"Machine Learning"},{"key":"22_CR21","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: A Library for Support Vector Machines, http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"22_CR22","unstructured":"Greenspun Image Library, http:\/\/philip.greenspun.com"}],"container-title":["Visual Information Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-0312-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T20:50:12Z","timestamp":1739393412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4419-0312-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9781441903112","9781441903129"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-0312-9_22","relation":{},"subject":[],"published":{"date-parts":[[2009]]},"assertion":[{"value":"30 September 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}