{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:26Z","timestamp":1740099146197,"version":"3.37.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319977485"},{"type":"electronic","value":"9783319977492"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97749-2_9","type":"book-chapter","created":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T16:30:28Z","timestamp":1532104228000},"page":"119-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Improved CNN Steganalysis Architecture Based on \u201cCatalyst Kernels\u201d and Transfer Learning"],"prefix":"10.1007","author":[{"given":"Rabii","family":"El Beji","sequence":"first","affiliation":[]},{"given":"Marwa","family":"Saidi","sequence":"additional","affiliation":[]},{"given":"Houcemeddine","family":"Hermassi","sequence":"additional","affiliation":[]},{"given":"Rhouma","family":"Rhouma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,21]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Information Hiding","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161\u2013177. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16435-4_13"},{"doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234\u2013239. IEEE (2012)","key":"9_CR2","DOI":"10.1109\/WIFS.2012.6412655"},{"doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1 (2014)","key":"9_CR3","DOI":"10.1186\/1687-417X-2014-1"},{"doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics, vol. 9409, p. 94090J (2015)","key":"9_CR4","DOI":"10.1117\/12.2083479"},{"key":"9_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-58469-0_22","volume-title":"ICT Systems Security and Privacy Protection","author":"J-F Couchot","year":"2017","unstructured":"Couchot, J.-F., Couturier, R., Salomon, M.: Improving blind steganalysis in spatial domain using a criterion to choose the appropriate steganalyzer between CNN and SRM+EC. In: De Capitani di Vimercati, S., Martinelli, F. (eds.) SEC 2017. IAICT, vol. 502, pp. 327\u2013340. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58469-0_22"},{"issue":"8","key":"9_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078","volume":"2016","author":"L Pibre","year":"2016","unstructured":"Pibre, L., Pasquet, J., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. Electron. Imaging 2016(8), 1\u201311 (2016)","journal-title":"Electron. Imaging"},{"doi-asserted-by":"crossref","unstructured":"Xu, G., Wu, H.-Z., Shi, Y.Q.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 103\u2013107. ACM (2016)","key":"9_CR7","DOI":"10.1145\/2909827.2930798"},{"issue":"3","key":"9_CR8","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"9_CR9","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Han-Zhou, W., Shi, Y.-Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Sig. Process. Lett."},{"doi-asserted-by":"crossref","unstructured":"Chen, M., Sedighi, V., Boroumand, M., Fridrich, J.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 75\u201384. ACM (2017)","key":"9_CR10","DOI":"10.1145\/3082031.3083248"},{"unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International Conference on Machine Learning, pp. 448\u2013456 (2015)","key":"9_CR11"},{"unstructured":"Tieleman, T., Hinton, G.: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning. Technical report. https:\/\/zh.coursera.org\/learn\/neuralnetworks\/lecture\/YQHki\/rmsprop-divide-the-gradient-by-a-running-average-of-its-recent-magnitude . Accessed 21 Apr 2017","key":"9_CR12"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_5"}],"container-title":["Lecture Notes in Business Information Processing","Digital Economy. Emerging Technologies and Business Innovation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97749-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T23:22:04Z","timestamp":1571613724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97749-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319977485","9783319977492"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97749-2_9","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]}}}