{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:42:40Z","timestamp":1725914560492},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_10","type":"book-chapter","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T01:08:03Z","timestamp":1509325683000},"page":"110-120","source":"Crossref","is-referenced-by-count":11,"title":["Steganalysis with CNN Using Multi-channels Filtered Residuals"],"prefix":"10.1007","author":[{"given":"Yafei","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Wei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Bingwen","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Fu, Z., Huang, F., Sun, X., Vasilakos, A. and Yang, C.-N.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. 1, PP (2016). 5555, doi:\n10.1109\/TSC.2016.2622697","DOI":"10.1109\/TSC.2016.2622697"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-45496-9_2","volume-title":"Information Hiding","author":"T Sharp","year":"2001","unstructured":"Sharp, T.: An implementation of key-based digital signal steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 13\u201326. Springer, Heidelberg (2001). doi:\n10.1007\/3-540-45496-9_2"},{"issue":"2","key":"10_CR3","first-page":"201","volume":"5","author":"W Luo","year":"2013","unstructured":"Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on lsb matchingrevisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201\u2013214 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Information Hiding","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161\u2013177. Springer, Heidelberg (2010). doi:\n10.1007\/978-3-642-16435-4_13"},{"issue":"1","key":"10_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1 (2014)","journal-title":"EURASIP J. Inf. Secur."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: IEEE International Conference on Image Processing, pp. 4206\u20134210 (2014)","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"2","key":"10_CR7","first-page":"435","volume":"18","author":"C Yuan","year":"2017","unstructured":"Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 435\u2013442 (2017)","journal-title":"J. Internet Technol."},{"issue":"8","key":"10_CR8","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2013","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283\u20131291 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"10_CR9","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2014","unstructured":"Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947\u20131962 (2014)","journal-title":"Multimedia Tools Appl."},{"issue":"6","key":"10_CR10","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1587\/transinf.2015EDP7341","volume":"E99-D","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Yang, C., Chen, B., Sun, X., Liu, Q., Wu, Q.: Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inf. Syst. E99-D(6), 1531\u20131540 (2016)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"1","key":"10_CR11","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou, Z., Wang, Y., Wu, Q., Yang, C., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48\u201363 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Steganalysis of spread spectrum data hiding exploiting cover memory. In: Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, 17\u201320 January 2005, pp. 38\u201346 (2005)","DOI":"10.1117\/12.588121"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-24178-9_8","volume-title":"Information Hiding","author":"J Fridrich","year":"2011","unstructured":"Fridrich, J., Kodovsk\u00fd, J., Holub, V., Goljan, M.: Steganalysis of content-adaptive steganography in spatial domain. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 102\u2013117. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-24178-9_8"},{"issue":"3","key":"10_CR14","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR15","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J.,Wang,W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Proceedings of SPIE, vol. 9409, pp. 94090J-1\u201394090J-10 (2015)","DOI":"10.1117\/12.2083479"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Pibre, L., Pasquet, J., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. In: Media Watermarking, Security, and Forensics, pp. 79\u201395 (2016)","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Learning and transferring representations for image steganalysis using convolutional neural network. In: IEEE International Conference on Image Processing, pp. 2752\u20132756 (2016)","DOI":"10.1109\/ICIP.2016.7532860"},{"key":"10_CR19","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/978-3-662-49831-6_64","volume-title":"Proceedings of the 2015 International Conference on Communications, Signal Processing, and Systems","author":"Y Qian","year":"2016","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Learning representations for steganalysis from regularized CNN model with auxiliary tasks. In: Liang, Q., Mu, J., Wang, W., Zhang, B. (eds.) Proceedings of the 2015 International Conference on Communications, Signal Processing, and Systems. LNEE, vol. 386, pp. 629\u2013637. Springer, Heidelberg (2016). doi:\n10.1007\/978-3-662-49831-6_64"},{"key":"10_CR20","unstructured":"Couchot, J.F., Couturier, R., Guyeux, C., Salomon, M.: Steganalysis via a convolutional neural network using large convolution filters for embedding process with same stego key (2016)"},{"issue":"5","key":"10_CR21","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Xu, G., Wu, H.Z., Shi, Y.Q.: Ensemble of CNNs for steganalysis: an empirical study. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 103\u2013107 (2016)","DOI":"10.1145\/2909827.2930798"},{"key":"10_CR23","unstructured":"Zeng, J., Tan, S., Li, B., Huang, J.: Large-scale JPEG steganalysis using hybrid deep-learning framework (2016)"},{"key":"10_CR24","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: Accelerating deep network training by reducing internal covariate shift. In: Computer Science (2015)"},{"issue":"3","key":"10_CR25","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-36415-3_22","volume-title":"Information Hiding","author":"S Lyu","year":"2003","unstructured":"Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340\u2013354. Springer, Heidelberg (2003). doi:\n10.1007\/3-540-36415-3_22"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Kodovsky, J., Fridrich, J., Holub, V.: On dangers of overtraining steganography to incomplete cover model. In: ACM Multimedia and Security Workshop, pp. 69\u201376 (2011)","DOI":"10.1145\/2037252.2037266"},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-24178-9_7","volume-title":"Information Hiding","author":"J Fridrich","year":"2011","unstructured":"Fridrich, J., Kodovsk\u00fd, J., Holub, V., Goljan, M.: Breaking HUGO \u2013 the process discovery. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, Andrew (eds.) IH 2011. LNCS, vol. 6958, pp. 85\u2013101. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-24178-9_7"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T.: Caffe: Convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM International Conference on Multimedia, MM 2014, pp. 675\u2013678. ACM, New York (2014)","DOI":"10.1145\/2647868.2654889"},{"issue":"2","key":"10_CR30","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T01:13:11Z","timestamp":1509325991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}