{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:38:23Z","timestamp":1742913503963,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_8","type":"book-chapter","created":{"date-parts":[[2016,10,30]],"date-time":"2016-10-30T23:53:29Z","timestamp":1477871609000},"page":"84-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices"],"prefix":"10.1007","author":[{"given":"Bing","family":"Cao","sequence":"first","affiliation":[]},{"given":"Guorui","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zhaoxia","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Pevn\u00fd, T., Kodovsk\u00fd, J.: Statistically undetectable JPEG steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th Workshop on Multimedia and Security, pp. 3\u201314. ACM, New York, September 2007","DOI":"10.1145\/1288869.1288872"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Guo, L.J., Ni, J.Q., Shi, Y.Q.: An efficient JPEG steganographic scheme using uniform embedding. In: Proceedings of the 7th IEEE International Workshop on Information Forensics and Security, pp. 169\u2013174. IEEE, December 2012","DOI":"10.1109\/WIFS.2012.6412644"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the first ACM Workshop on Information Hiding and Multimedia Security, pp. 59\u201368. ACM, New York, June 2013","DOI":"10.1145\/2482513.2482514"},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1\u201313 (2014)","journal-title":"EURASIP J. Inf. Secur."},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Kodovsky, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: Proceedings of International Society for Optics and Photonics, SPIE Electronic Imaging, pp. 83030A\u201383030A-13, January 2012","DOI":"10.1117\/12.907495"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Kodovsky, J., Fridrich, J.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: Proceedings the 3rd SPIE Workshop on Media Watermarking, Security, and Forensics, SPIE Electronic Imaging, pp. 78800L\u201378800L-13, January 2011","DOI":"10.1117\/12.872279"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J.: Low complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219\u2013228 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Song, X.F., Liu, F.L., Yang, C.F., Luo, X.Y., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 15\u201323. ACM, New York, June 2015","DOI":"10.1145\/2756601.2756608"},{"issue":"3","key":"8_CR10","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1109\/LSP.2013.2240385","volume":"20","author":"F Li","year":"2013","unstructured":"Li, F., Zhang, X., Chen, B., Feng, G.: JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier. IEEE Signal Process. Lett. 20(3), 233\u2013236 (2013)","journal-title":"IEEE Signal Process. Lett."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C., Feng, G.R.: Calibration-based features for JPEG steganalysis using multi-level filter. In: Proceedings of International Conference on Signal Processing, Communications and Computing, pp. 1\u20134. IEEE, September 2015","DOI":"10.1109\/ICSPCC.2015.7338897"},{"issue":"7","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1364\/JOSAA.2.001160","volume":"2","author":"JG Daugman","year":"1985","unstructured":"Daugman, J.G.: Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. J. Opt. Soc. Am. A 2(7), 1160\u20131169 (1985)","journal-title":"J. Opt. Soc. Am. A"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: \u201cBreak Our Steganographic System\u201d: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011)"},{"issue":"2","key":"8_CR14","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"8_CR15","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"LJ Guo","year":"2014","unstructured":"Guo, L.J., Ni, J.Q., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814\u2013825 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:10:16Z","timestamp":1558476616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}