{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:38:10Z","timestamp":1775745490485,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540741237","type":"print"},{"value":"9783540741244","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_17","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"249-264","source":"Crossref","is-referenced-by-count":135,"title":["A Markov Process Based Approach to Effective Attacking JPEG Steganography"],"prefix":"10.1007","author":[{"given":"Yun Q.","family":"Shi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chunhua","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wen","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5 a steganographic algorithm: high capacity despite better steganalysis. In: 4th International Workshop on Information Hiding, Pittsburgh, PA, USA (2001)","DOI":"10.1007\/3-540-45496-9_21"},{"key":"17_CR2","unstructured":"Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA (2001)"},{"issue":"1","key":"17_CR3","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P. Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics\u00a05(1), 167\u2013190 (2005)","journal-title":"International Journal of Image and Graphics"},{"key":"17_CR4","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Image steganography: concepts and practice, Lecture Note Series, Institute for Mathematical Sciences, National University of Singapore (2004)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Farid, H.: Detecting hidden messages using higher-order statistical models. In: International Conference on Image Processing, Rochester, NY, USA (2002)","DOI":"10.1109\/ICIP.2002.1040098"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Xuan, G., Zou, D., Gao, J., Yang, C., Zhang, Z., Chai, P., Chen, W., Chen, C.: Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In: International Conference on Multimedia and Expo, Amsterdam, Netherlands (2005)","DOI":"10.1109\/ICME.2005.1521412"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: 6th International Workshop on Information Hiding, Toronto, ON, Canada (2004)","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Steganalysis of spread spectrum data hiding exploiting cover memory, the International Society for Optical Engineering, Electronic Imaging, San Jose, CA, USA (2005)","DOI":"10.1117\/12.588121"},{"issue":"11","key":"17_CR9","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TIP.2002.804279","volume":"11","author":"C. Tu","year":"2002","unstructured":"Tu, C., Tran, T.D.: Context-based entropy coding of block transform coefficients for image compression. IEEE Transactions on Image Processing\u00a011(11), 1271\u20131283 (2002)","journal-title":"IEEE Transactions on Image Processing"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Sun, H.: Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards, CRC press (1999)","DOI":"10.1201\/9781420049794"},{"key":"17_CR11","volume-title":"Probability and random processes for electrical engineering","author":"A. Leon-Garcia","year":"1994","unstructured":"Leon-Garcia, A.: Probability and random processes for electrical engineering, 2nd edn. Addison-Wesley, London, UK (1994)","edition":"2"},{"key":"17_CR12","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"issue":"2","key":"17_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C.J.C. Burges","year":"1998","unstructured":"Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery\u00a02(2), 121\u2013167 (1998)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"17_CR14","unstructured":"http:\/\/www.outguess.org\/"},{"key":"17_CR15","unstructured":"http:\/\/wwwrn.inf.tu-dresden.de\/~westfeld\/f5.html"},{"key":"17_CR16","unstructured":"http:\/\/redwood.ucdavis.edu\/phil\/papers\/iwdw03.htm"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.D.: Benchmarking steganographic and steganalysis techniques, Security, Steganography, and Watermarking of Multimedia Contents 2005, San Jose, CA, USA (2005)","DOI":"10.1117\/12.587375"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:17Z","timestamp":1619518277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}