{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:58:35Z","timestamp":1740099515773,"version":"3.37.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030305079"},{"type":"electronic","value":"9783030305086"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30508-6_7","type":"book-chapter","created":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T19:02:47Z","timestamp":1567969367000},"page":"81-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Improved Convolutional Neural Network for Steganalysis in the Scenario of Reuse of the Stego-Key"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7904-5567","authenticated-orcid":false,"given":"Bartosz","family":"Czaplewski","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"issue":"5","key":"7_CR1","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MSP.2011.941841","volume":"28","author":"Mauro Barni","year":"2011","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2010). ISBN 978-0-521-19019-0. \n                      https:\/\/doi.org\/10.1109\/msp.2011.941841","journal-title":"IEEE Signal Processing Magazine"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Czaplewski, B.: Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes. Przegl\u0105d Telekomunikacyjny\u2009+\u2009Wiadomo\u015bci Telekomunikacyjne [=\u2009Telecommun. Rev.\u2009+\u2009Telecommun. News] 10, 1121\u20131125 (2017). \n                      https:\/\/doi.org\/10.15199\/59.2017.10.3","DOI":"10.15199\/59.2017.10.3"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsk\u00fd, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 7(3), 868\u2013882 (2012). \n                      https:\/\/doi.org\/10.1109\/TIFS.2012.2190402","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"7","key":"7_CR4","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.4304\/jsw.9.7.1833-1840","volume":"9","author":"F He","year":"2014","unstructured":"He, F., Zhong, S., Chen, K.: An effective ensemble-based classification algorithm for high-dimensional steganalysis. J. Softw. 9(7), 1833\u20131840 (2014). \n                      https:\/\/doi.org\/10.4304\/jsw.9.7.1833-1840","journal-title":"J. Softw."},{"issue":"8","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078","volume":"2016","author":"Lionel Pibre","year":"2016","unstructured":"Pibre, L., Pasquet, J., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch. In: Proceedings of Media Watermarking, Security, and Forensics, MWSF 2016, Part of I&ST International Symposium on Electronic Imaging, EI 2016, San Francisco, California, USA, pp. 1\u201311 (2016). \n                      https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2016.8.MWSF-078","journal-title":"Electronic Imaging"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Tan, S., Li, B.: Stacked convolutional auto-encoders for steganalysis of digital images. In: Proceedings of Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014, Siem Reap, Cambodia, pp. 1\u20134 (2014). \n                      https:\/\/doi.org\/10.1109\/apsipa.2014.7041565","DOI":"10.1109\/apsipa.2014.7041565"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Proceedings of Media Watermarking, Security, and Forensics 2015, MWSF 2015, Part of IS&T\/SPIE Annual Symposium on Electronic Imaging, SPIE 2015, San Francisco, California, USA, vol. 9409, pp. 94090J\u201394090J\u201310 (2015). \n                      https:\/\/doi.org\/10.1117\/12.2083479","DOI":"10.1117\/12.2083479"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Xu, G., Wu, H.Z., Shi, Y.Q.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, Vigo, Galicia, Spain, IH&MMSec 2016, pp. 103\u2013107 (2016). \n                      https:\/\/doi.org\/10.1145\/2909827.2930798","DOI":"10.1145\/2909827.2930798"},{"issue":"7","key":"7_CR9","doi-asserted-by":"publisher","first-page":"44","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-324","volume":"2017","author":"Jishen Zeng","year":"2017","unstructured":"Zeng, J., Tan, S., Li, B., Huang, J.: Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis. In: Proceedings of the Media Watermarking, Security, and Forensics 2017, MWSF 2017, Part of IS&T Symposium on Electronic Imaging, EI 2017, Burlingame, California, USA, p. 6 (2017). \n                      https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2017.7.MWSF-324","journal-title":"Electronic Imaging"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Chen, M., Sedighi, V., Boroumand, M., Fridrich, S.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Drexel University in Philadelphia, PA, IH&MMSec 2017, pp. 75\u201384 (2017). \n                      https:\/\/doi.org\/10.1145\/3082031.3083248","DOI":"10.1145\/3082031.3083248"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Xu, G.: Deep convolutional neural network to detect JUNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Drexel University in Philadelphia, PA, IH&MMSec 2017, pp. 67\u201373 (2017). \n                      https:\/\/doi.org\/10.1145\/3082031.3083236","DOI":"10.1145\/3082031.3083236"},{"key":"7_CR12","doi-asserted-by":"publisher","unstructured":"Yedroudj, M., Comby, F., Chaumont, M.: Yedroudj-Net: an efficient CNN for spatial steganalysis. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2018, Calgary, Alberta, Canada (2018). \n                      https:\/\/doi.org\/10.1109\/icassp.2018.8461438","DOI":"10.1109\/icassp.2018.8461438"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2019: Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30508-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T19:17:29Z","timestamp":1567970249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30508-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030305079","9783030305086"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30508-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}