{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:05:13Z","timestamp":1742947513179,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319193205"},{"type":"electronic","value":"9783319193212"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19321-2_36","type":"book-chapter","created":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T17:20:34Z","timestamp":1432747234000},"page":"470-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier"],"prefix":"10.1007","author":[{"given":"Jie","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Qingxiao","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,28]]},"reference":[{"issue":"4","key":"36_CR1","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/TIFS.2008.2002936","volume":"3","author":"T Pevn\u00fd","year":"2008","unstructured":"Pevn\u00fd, T., Fridrich, J.: Multiclass detector of current steganographic methods for JPEG format. IEEE Trans. Inf. Forensics Secur. 3(4), 635\u2013650 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/11551492_4","volume-title":"Digital Watermarking","author":"T Pevn\u00fd","year":"2005","unstructured":"Pevn\u00fd, T., Fridrich, J.: Towards multi-class blind steganalyzer for JPEG images. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 39\u201353. Springer, Heidelberg (2005)"},{"key":"36_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-03688-0_19","volume-title":"Digital Watermarking","author":"J Dong","year":"2009","unstructured":"Dong, J., Wang, W., Tan, T.: Multi-class blind steganalysis based on image run-length analysis. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 199\u2013210. Springer, Heidelberg (2009)"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Electronic Imaging 2007. International Society for Optics and Photonics (2007)","DOI":"10.1117\/12.696774"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Lubenko, I., Ker, A.D.: Steganalysis using logistic regression. In: IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics (2011)","DOI":"10.1117\/12.872245"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics (2012)","DOI":"10.1117\/12.907495"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., Fridrich, J.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: Proceedings of the SPIE, Media Watermarking, Security, and Forensics III, vol. 7880, p. 78800L, 10 February 2011","DOI":"10.1117\/12.872279"},{"issue":"2","key":"36_CR8","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"36_CR9","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsk\u00fd, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR10","first-page":"1871","volume":"9","author":"RE Fan","year":"2008","unstructured":"Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. 9, 1871\u20131874 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings of the SPIE, Media Watermarking, Security, and Forensics 2013, vol. 8665, p. 86650L, 22 March 2013","DOI":"10.1117\/12.1000330"},{"issue":"12","key":"36_CR12","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996\u20132006 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., Pevn\u00fd, T., Fridrich, J.: Modern steganalysis can detect YASS. In: Proceedings of the SPIE, Media Forensics and Security II, vol. 7541, p. 754102, 27 January 2010","DOI":"10.1117\/12.838768"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Craver, S., Fridrich, J. (eds.) Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, pp. 63\u201374, 7\u20138 September 2009","DOI":"10.1145\/1597817.1597830"},{"key":"36_CR15","unstructured":"LIBSVM \u2013 A Library for Support Vector Machines. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"},{"key":"36_CR16","unstructured":"LIBLINEAR \u2013 A Library for Large Linear Classification. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/liblinear\/"},{"issue":"2","key":"36_CR17","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"CW Hsu","year":"2002","unstructured":"Hsu, C.W., Lin, C.J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415\u2013425 (2002)","journal-title":"IEEE Trans. Neural Netw."},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Pevn\u00fd, T., Kodovsk\u00fd, J.: Statistically undetectable JPEG steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 3\u201314. ACM (2007)","DOI":"10.1145\/1288869.1288872"},{"key":"36_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"36_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-74124-4_21","volume-title":"Information Hiding","author":"YH Kim","year":"2007","unstructured":"Kim, Y.H., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P.(eds.) IH 2006. LNCS, vol. 4437, pp. 314\u2013327. Springer, Heidelberg (2007)"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec 2013), pp. 59\u201368. ACM, New York (2013)","DOI":"10.1145\/2482513.2482514"},{"issue":"01","key":"36_CR22","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. Int. J. Image Graph. 5(01), 167\u2013189 (2005)","journal-title":"Int. J. Image Graph."},{"key":"36_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-92238-4_11","volume-title":"Digital Watermarking","author":"C Ullerich","year":"2008","unstructured":"Ullerich, C., Westfeld, A.: Weaknesses of MB2. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 127\u2013142. Springer, Heidelberg (2008)"},{"issue":"2","key":"36_CR24","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Denemark, T., Fridrich, J., Holub, V.: Further study on the security of SUNIWARD. In: Proceedings of the SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics, vol. 9028, pp. 2\u20136 (2014)","DOI":"10.1117\/12.2044803"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19321-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T09:12:58Z","timestamp":1674205978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19321-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319193205","9783319193212"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19321-2_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}