{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:29:22Z","timestamp":1758274162884},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_11","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:19:24Z","timestamp":1563391164000},"page":"115-127","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Improved Steganalysis Method Using Feature Combinations"],"prefix":"10.1007","author":[{"given":"Zichi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhenxing","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TIP.2018.2878290","volume":"28","author":"S Li","year":"2019","unstructured":"Li, S., Zhang, X.: Towards construction based data hiding: from secrets to fingerprint images. IEEE Trans. Image Process. 28(3), 1482\u20131497 (2019)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"11_CR2","first-page":"001","volume":"55","author":"R Meng","year":"2018","unstructured":"Meng, R., Rice, S., Wang, J., Sun, X.: A fusion steganographic algorithm based on faster R-CNN. CMC: Comput. Mater. Contin. 55(1), 001\u2013016 (2018)","journal-title":"CMC: Comput. Mater. Contin."},{"issue":"3","key":"11_CR3","first-page":"483","volume":"55","author":"X Duan","year":"2018","unstructured":"Duan, X., Song, H., Qin, C., Khan, M.: Coverless steganography for digital images based on a generative model. CMC: Comput. Mater. Contin. 55(3), 483\u2013493 (2018)","journal-title":"CMC: Comput. Mater. Contin."},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/TIFS.2015.2496910","volume":"11","author":"F Li","year":"2016","unstructured":"Li, F., Wu, K., Lei, J., Wen, M., Bi, Z., Gu, C.: Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans. Inf. Forensics Secur. 11(2), 344\u2013357 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/LSP.2018.2865888","volume":"25","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Zhang, X., Yin, Z.: Joint cover-selection and payload-allocation by steganographic distortion optimization. IEEE Signal Process. Lett. 25(10), 1530\u20131534 (2018)","journal-title":"IEEE Signal Process. Lett."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-319-53465-7_36","volume-title":"Digital Forensics and Watermarking","author":"Zichi Wang","year":"2017","unstructured":"Wang, Z., Lv, J., Wei, Q., Zhang, X.: Distortion function for spatial image steganography based on the polarity of embedding change. In: The 15th International Workshop on Digital-forensics and Watermarking (IWDW 2016), Beijing, China, pp. 487\u2013493, September 2016"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using Syndrome-Trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"90","DOI":"10.4018\/IJDCF.2019010107","volume":"11","author":"Z Wang","year":"2019","unstructured":"Wang, Z., Yin, Z., Zhang, X.: Asymmetric distortion function for JPEG steganography using block artifact compensation. Int. J. Digit. Crime Forensics 11(1), 90\u201399 (2019)","journal-title":"Int. J. Digit. Crime Forensics"},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1080\/02564602.2017.1304289","volume":"35","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Yin, Z., Zhang, X.: Distortion function for JPEG steganography based on image-texture and correlation in DCT domain. IETE Tech. Rev. 35(4), 351\u2013358 (2018)","journal-title":"IETE Tech. Rev."},{"issue":"5","key":"11_CR10","doi-asserted-by":"publisher","first-page":"050501","DOI":"10.1117\/1.JEI.25.5.050501","volume":"25","author":"Z Wang","year":"2016","unstructured":"Wang, Z., Zhang, X., Yin, Z.: Hybrid distortion function for JPEG steganography. J. Electron. Imaging 25(5), 050501 (2016)","journal-title":"J. Electron. Imaging"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Kodovsky, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: Proceedings of the International Society for Optics and Photonics, San Francisco, CA, USA, pp. 83030A\u201383030A-13, January 2012","DOI":"10.1117\/12.907495"},{"issue":"2","key":"11_CR12","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"Trans. Inf. Forensics Secur."},{"issue":"11","key":"11_CR13","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"74917","DOI":"10.1109\/ACCESS.2018.2884198","volume":"6","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Qian, Z., Zhang, X., Yang, M., Ye, D.: On improving distortion functions for JPEG steganography. IEEE Access 6(1), 74917\u201374930 (2018)","journal-title":"IEEE Access"},{"issue":"3","key":"11_CR15","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996\u20132006 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, Atlanta, GA, pp. 48\u201353, December 2014","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"7","key":"11_CR18","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/TIFS.2017.2682703","volume":"12","author":"S Tan","year":"2017","unstructured":"Tan, S., Zhang, H., Li, B., Huang, J.: Pixel-decimation-assisted steganalysis of synchronize-embedding-changes steganography. IEEE Trans. Inf. Forensics Secur. 12(7), 1658\u20131670 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"11_CR19","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"B Li","year":"2015","unstructured":"Li, B., Wang, M., Li, X., Tan, S., Huang, J.W.: A strategy of clustering modification directions in spatial image steganography. IEEE Trans. Inf. Forensics Secur. 10(9), 1905\u20131917 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: Proceedings of the IEEE International Conference on Image Processing, Paris, France, pp. 4206\u20134210, October 2014","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA, pp. 59\u201368, June 2013","DOI":"10.1145\/2482513.2482514"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Binghamton, NY, USA, pp. 234\u2013239, December 2012","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"2","key":"11_CR23","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Proceedings of the International Workshop on Information Hiding, Portland, Oregon, USA, pp. 306\u2013318, April 1998","DOI":"10.1007\/3-540-49380-8_21"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, pp. 2\u20133, February 2007","DOI":"10.1117\/12.697471"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"Patrick Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of the 13th International Conference on Information Hiding, Prague, Czech Republic, pp. 59\u201370, May 2011"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th International Conference on Information Hiding, Calgary, AB, Canada, pp. 161\u2013177, June 2010","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Miche, Y., Roue, B., Lendasse, A., Bas, P.: A feature selection methodology for steganalysis. In: Proceedings of the International Workshop on Multimedia Content Representation, Classification and Security, Istanbul, Turkey, pp. 49\u201356, September 2006","DOI":"10.1007\/11848035_9"},{"key":"11_CR29","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.engappai.2013.09.016","volume":"31","author":"FG Mohammadi","year":"2014","unstructured":"Mohammadi, F.G., Abadeh, M.S.: Image steganalysis using a bee colony based feature selection algorithm. Eng. Appl. Artif. Intell. 31, 35\u201343 (2014)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"11_CR30","unstructured":"Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: Proceedings of the Conference on Storage and Retrieval Methods and Applications for Multimedia, San Jose, CA, USA, pp. 472\u2013480, January 2004"},{"key":"11_CR31","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.jnca.2018.09.019","volume":"125","author":"Z Guan","year":"2019","unstructured":"Guan, Z., Zhang, Y., Wu, L., Wu, J., Ma, Y., Hu, J.: APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J. Netw. Comput. Appl. 125, 82\u201392 (2019)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"11_CR32","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TNSM.2018.2799000","volume":"15","author":"J Wu","year":"2018","unstructured":"Wu, J., Dong, M., Ota, K., Li, J., Guan, Z.: Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(1), 27\u201338 (2018)","journal-title":"IEEE Trans. Netw. Serv. Manag."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:28:02Z","timestamp":1563391682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}