{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:23:47Z","timestamp":1742988227292,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030113889"},{"type":"electronic","value":"9783030113896"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11389-6_22","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:51:03Z","timestamp":1548348663000},"page":"290-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain"],"prefix":"10.1007","author":[{"given":"Th\u00e9o","family":"Taburet","sequence":"first","affiliation":[]},{"given":"Louis","family":"Filstroff","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Bas","sequence":"additional","affiliation":[]},{"given":"Wadih","family":"Sawaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Abdulrahman, H., Chaumont, M., Montesinos, P., Magnier, B.: Color image steganalysis based on steerable gaussian filters bank. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 109\u2013114. ACM (2016)","DOI":"10.1145\/2909827.2930799"},{"key":"22_CR2","unstructured":"Bas, P., Pevny, T., Filler, T.: Bossbase (May 2011). http:\/\/exile.felk.cvut.cz\/boss"},{"issue":"3","key":"22_CR3","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J.: CFA-aware features for steganalysis of color images. In: IS&T\/SPIE Electronic Imaging. pp. 94090V\u201394090V. International Society for Optics and Photonics (2015)","DOI":"10.1117\/12.2078399"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Cogranne, R., et al.: Rich model for steganalysis of color images. In: National Conference on Parallel Computing Technologies (PARCOMPTECH), pp. 185\u2013190. IEEE (2015)","DOI":"10.1109\/WIFS.2014.7084325"},{"issue":"12","key":"22_CR6","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","volume":"10","author":"L Guo","year":"2015","unstructured":"Guo, L., Ni, J., Su, W., Tang, C., Shi, Y.Q.: Using statistical image model for jpeg steganography: uniform embedding revisited. IEEE Trans. Inf. Forensics Secur. 10(12), 2669\u20132680 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"22_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub, V., Fridrich, J.: Low-complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219\u2013228 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"22_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1\u201313 (2014)","journal-title":"EURASIP J. Inf. Secur."},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-74124-4_18","volume-title":"Information Hiding","author":"AD Ker","year":"2007","unstructured":"Ker, A.D., et al.: Batch steganography and pooled steganalysis. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 265\u2013281. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74124-4_18"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Ker, A.D., et al.: Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 45\u201358. ACM (2013)","DOI":"10.1145\/3245189"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Ker, A.D., Pevn\u1ef3, T., Kodovsk\u1ef3, J., Fridrich, J.: The square root law of steganographic capacity. In: Proceedings of the 10th ACM workshop on Multimedia and security, pp. 107\u2013116. ACM (2008)","DOI":"10.1145\/1411328.1411349"},{"issue":"2","key":"22_CR12","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"22_CR13","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"B Li","year":"2015","unstructured":"Li, B., Wang, M., Li, X., Tan, S., Huang, J.: A strategy of clustering modification directions in spatial image steganography. IEEE Trans. Inf. Forensics Secur. 10(9), 1905\u20131917 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive jpeg steganography using 2D gabor filters. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp. 15\u201323. ACM (2015)","DOI":"10.1145\/2756601.2756608"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2014a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289\u2013302. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45496-9_21"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Zeng, J., Tan, S., Liu, G., Li, B., Huang, J.: Wisernet: Wider separate-then-reunion network for steganalysis of color images. arXiv preprint arXiv:1803.04805 (2018)","DOI":"10.1109\/TIFS.2019.2904413"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11389-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:54:35Z","timestamp":1709823275000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11389-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030113889","9783030113896"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11389-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}