{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:59:24Z","timestamp":1762325964248,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031637537"},{"type":"electronic","value":"9783031637513"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63751-3_4","type":"book-chapter","created":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T19:26:33Z","timestamp":1719429993000},"page":"50-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Architectural Modifications to Enhance Steganalysis with Convolutional Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9337-1082","authenticated-orcid":false,"given":"Remigiusz","family":"Martyniak","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7904-5567","authenticated-orcid":false,"given":"Bartosz","family":"Czaplewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,27]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE international workshop on information forensics and security (WIFS), pp. 234\u2013239 (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inform. Secur. (2014)","DOI":"10.1186\/1687-417X-2014-1"},{"key":"4_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, United Kingdom (2009)"},{"key":"4_CR4","unstructured":"Czaplewski, B.: Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes. Telecommun. Rev. + Telecommun. News 10(3), 1121\u20131125 (2017)"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"68970","DOI":"10.1109\/ACCESS.2019.2918086","volume":"7","author":"T-S Reinel","year":"2019","unstructured":"Reinel, T.-S., Ra\u00fal, R.-P., Gustavo, I.: Deep learning applied to steganalysis of digital images: a systematic review. IEEE Access 7, 68970\u201368990 (2019)","journal-title":"IEEE Access"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Tan, S., Li, B.: Stacked convolutional auto-encoders for steganalysis of digital images. In: Proceedings of the signal and information processing association annual summit and conference, pp. 1\u20134. APSIPA, Siem Reap, Cambodia (2014)","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Proceeding of the media watermarking, security, and forensics 2015, MWSF\u20192015, Part of IS&T\/SPIE Annual Symposium on Electronic Imaging, SPIE\u20192015, pp. 94090J\u201394090J\u201310. San Francisco, California, USA (2015)","DOI":"10.1117\/12.2083479"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Pibre, L., Pasquet, J., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch. In: Proceedings of the media watermarking, security, and forensics, MWSF, Part of I&ST international symposium on electronic imaging, pp. 1\u201311. EI, San Francisco, California, USA (2016)","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Xu, G., Wu, H.Z., Shi, Y.Q.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceeding of the 4th ACM workshop on information hiding and multimedia security, pp. 103\u2013107. IH&MMSec 2016, Vigo, Galicia, Spain (2016)","DOI":"10.1145\/2909827.2930798"},{"key":"4_CR10","unstructured":"Zeng, J., Tan, S., Li, B., Huang, J.: Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis. In: Proceedings of the media watermarking, security, and forensics 2017, MWSF\u20192017, Part of IS&T symposium on electronic imaging, p. 6. EI, Burlingame, California, USA (2017)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Chen, M., Sedighi, V., Boroumand, M., Fridrich, S.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, pp. 75\u201384. IH&MMSec 2017, Drexel University in Philadelphia, PA (2017)","DOI":"10.1145\/3082031.3083248"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Xu, G.: Deep convolutional neural network to detect JUNIWARD. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, pp. 67\u201373. IH&MMSec 2017, Drexel University in Philadelphia, PA (2017)","DOI":"10.1145\/3082031.3083236"},{"issue":"5","key":"4_CR13","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Signal Process. Lett."},{"issue":"5","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181\u20131193 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Yedrouj, M., Comby, F., Chaumont, M.: Yedrouj-Net: an efficient CNN for spatial steganalysis. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing, ICASSP 2018, Calgary, Alberta, Canada (2018)","DOI":"10.1109\/ICASSP.2018.8461438"},{"issue":"11","key":"4_CR16","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Czaplewski, B.: An improved convolutional neural network for steganalysis in the scenario of reuse of the stego-key. In: 28th international conference on artificial neural networks and machine learning \u2013 ICANN 2019, Munich (2019)","DOI":"10.1007\/978-3-030-30508-6_7"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"14340","DOI":"10.1109\/ACCESS.2021.3052494","volume":"9","author":"T-S Reinel","year":"2021","unstructured":"Reinel, T.-S., et al.: GBRAS-Net: a convolutional neural network architecture for spatial image steganalysis. IEEE Access 9, 14340\u201314350 (2021)","journal-title":"IEEE Access"},{"key":"4_CR19","unstructured":"Binghamton\u2019s University DDE download section. https:\/\/dde.binghamton.edu\/download. Accessed 22 Nov 2023"},{"key":"4_CR20","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.616","volume":"7","author":"R Tabares-Soto","year":"2021","unstructured":"Tabares-Soto, R., et al.: Sensitivity of deep learning applied to spatial image steganalysis. PeerJ Comput. Sci. 7, e616 (2021)","journal-title":"PeerJ Comput. Sci."},{"key":"4_CR21","unstructured":"Binghamton\u2019s University DDE Steganographic Algorithms section. https:\/\/dde.binghamton.edu\/download\/stego_algorithms. Accessed 22 Nov 2023"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63751-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T19:27:08Z","timestamp":1719430028000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63751-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031637537","9783031637513"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63751-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}