{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:16Z","timestamp":1771658056421,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319534640","type":"print"},{"value":"9783319534657","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53465-7_42","type":"book-chapter","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T09:53:19Z","timestamp":1487152399000},"page":"564-577","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Deep Learning on Spatial Rich Model for Steganalysis"],"prefix":"10.1007","author":[{"given":"Xiaoyu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yifeng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Guangming","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Shiyuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"issue":"7553","key":"42_CR1","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"issue":"11","key":"42_CR2","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"42_CR3","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Ouyang, W., Wang, X., Zeng, X., Qiu, S., Luo, P., Tian, Y., Tang, X.: Deformable deep convolutional neural networks for object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2403\u20132412 (2015)","DOI":"10.1109\/CVPR.2015.7298854"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Zou, D., Shi, Y. Q., Su, W., Xuan, G.: Steganalysis based on Markov model of thresholded prediction-error image. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 1365\u20131368. IEEE, July 2006","DOI":"10.1109\/ICME.2006.262792"},{"key":"42_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-36373-3_5","volume-title":"Information Hiding","author":"YQ Shi","year":"2013","unstructured":"Shi, Y.Q., Sutthiwan, P., Chen, L.: Textural features for steganalysis. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 63\u201377. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-36373-3_5"},{"issue":"3","key":"42_CR7","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"42_CR8","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"42_CR9","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996\u20132006 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"42_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-319-19321-2_43","volume-title":"Digital-Forensics and Watermarking","author":"L Chen","year":"2015","unstructured":"Chen, L., Shi, Y.-Q., Sutthiwan, P.: Variable multi-dimensional co-occurrence for steganalysis. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 559\u2013573. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-19321-2_43"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Tan, S., Li, B.: Stacked convolutional auto-encoders for steganalysis of digital images. In: 2014 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), pp. 1\u20134. IEEE, December 2014","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: International Society for Optics and Photonics SPIE\/IS & T Electronic Imaging, p. 94090J, March 2015","DOI":"10.1117\/12.2083479"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Pibre, L., J\u00e9r\u00f4me, P., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch. In EI: Electronic Imaging, February 2016","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078"},{"issue":"5","key":"42_CR14","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Sig. Process. Lett."},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Ker, A.D., B\u00f6hme, R.: Revisiting weighted stego-image steganalysis. In: Electronic Imaging 2008, p. 681905. International Society for Optics and Photonics, February 2008","DOI":"10.1117\/12.766820"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, p. 59. C68, June 2013","DOI":"10.1145\/2482513.2482514"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206\u20134210. IEEE, October 2014","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"2","key":"42_CR18","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"42_CR19","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML 2010), pp. 807\u2013814 (2010)"},{"key":"42_CR20","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.R.: Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580 (2012)"},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Darrell, T.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM International Conference on Multimedia, pp. 675\u2013678. ACM, November 2014","DOI":"10.1145\/2647868.2654889"},{"key":"42_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: the Ins and Outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-24178-9_5"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 48\u201353. IEEE, December 2014","DOI":"10.1109\/WIFS.2014.7084302"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53465-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:28:50Z","timestamp":1709821730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-53465-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319534640","9783319534657"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53465-7_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iwdw.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}