{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:44:59Z","timestamp":1742971499926,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_12","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T06:04:33Z","timestamp":1229407473000},"page":"143-157","source":"Crossref","is-referenced-by-count":0,"title":["Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis"],"prefix":"10.1007","author":[{"given":"Bin","family":"Li","sequence":"first","affiliation":[]},{"given":"Fangjun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Shunquan","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yun Q.","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"http:\/\/www.nic.funet.fi\/pub\/crypt\/steganography\/jpeg-jsteg-v4.diff.gz"},{"key":"12_CR2","unstructured":"Latham, A.: Steganography: JPHIDE and JPSEEK (1999), \n                    \n                      http:\/\/linux01.gwdg.de\/~alatham\/stego.html"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5 \u2013 A steganographic algorithm (high capacity despite better steganalysis). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"12_CR4","unstructured":"Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium (2001)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P. Sallee","year":"2005","unstructured":"Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics\u00a05, 167\u2013189 (2005)","journal-title":"International Journal of Image and Graphics"},{"key":"12_CR7","first-page":"4","volume-title":"Proceedings ACM Multimedia and Security Workshop","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturb quantization steganography using wet paper codes. In: Dittman, J., Fridrich, J. (eds.) Proceedings ACM Multimedia and Security Workshop, pp. 4\u201315. ACM Press, New York (2004)"},{"key":"12_CR8","unstructured":"Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding for minimal distortion steganography. In: Information Hiding: 8th International Workshop (2006)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201375. Springer, Heidelberg (2000)"},{"key":"12_CR10","unstructured":"Provos, N., Honeyman, P.: Detecting steganographic content on the Internet. CITI Technical Report, pp. 01\u201311 (2001)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-36415-3_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2003","unstructured":"Westfeld, A.: Detecting low embedding rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 324\u2013339. Springer, Heidelberg (2003)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: New methodology for breaking steganographic techniques for JPEGs. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography of Multimedia Contents V, San Jose, CA, January 20-24, vol.\u00a05020, pp. 143\u2013155 (2003)","DOI":"10.1117\/12.473142"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"key":"12_CR14","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proceedings ACM Workshop on Multimedia and Security (2002)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-30108-0_8","volume-title":"Computer Security \u2013 ESORICS 2004","author":"R. B\u00f6hme","year":"2004","unstructured":"B\u00f6hme, R., Westfeld, A.: Breaking Cauchy model-based JPEG steganography with first order statistic. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 125\u2013140. Springer, Heidelberg (2004)"},{"key":"12_CR16","unstructured":"Farid, H.: Detecting steganographic messages in digital images. Technical Report, TR2001-412, Dartmouth College, Computer Science (2001)"},{"key":"12_CR17","unstructured":"Avcibas, I., Memon, N., Sankur, B.: Image steganalysis with binary similarity measures. In: Proceedings of the IEEE International Conference on Image Processing, Rochester, New York, vol.\u00a03, pp. 45\u2013648 (2002)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"12_CR19","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: 8th Information Hiding Workshop (2006)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. SPIE Electronic Imaging, Photonics West (2007)","DOI":"10.1117\/12.696774"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/11922841_21","volume-title":"Digital Watermarking","author":"J. Barbier","year":"2006","unstructured":"Barbier, J., Filiol, E., Mayoura, K.: Universal JPEG steganalysis in the compressed frequency domain. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 253\u2013267. Springer, Heidelberg (2006)"},{"key":"12_CR22","first-page":"72","volume":"16","author":"J. Barbier","year":"2006","unstructured":"Barbier, J., Filiol, E., Mayoura, K.: New features for specific JPEG Steganalysis. Transactions on Engineering, Computing and Technology\u00a016, 72\u201377 (2006)","journal-title":"Transactions on Engineering, Computing and Technology"},{"issue":"4","key":"12_CR23","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"34","author":"G.K. Wallace","year":"1991","unstructured":"Wallace, G.K.: The JPEG still picture compression standard. Communication of ACM\u00a034(4), 30\u201344 (1991)","journal-title":"Communication of ACM"},{"issue":"5","key":"12_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"Feistel, H.: Cryptography and computer privacy. Scientific American\u00a0228(5), 15\u201323 (1973)","journal-title":"Scientific American"},{"key":"12_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley Interscience, New York (1991)"},{"key":"12_CR26","unstructured":"Schaefer, G., Stich, M.: UCID \u2013 An uncompressed colour image database. In: Proceedings SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, pp. 472\u2013480 (2004)"},{"key":"12_CR27","unstructured":"Sallee, P.: Matlab JPEG Toolbox (2003), \n                    \n                      http:\/\/redwood.ucdavis.edu\/phil\/demos\/jpegtbx\/jpegtbx.htm"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Benchmarking steganographic and steganalysis techniques. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, January 16-20, vol.\u00a05681, pp. 252\u2013263 (2005)","DOI":"10.1117\/12.587375"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Chen, C., Chen, W., Kaundinya, M.P.: Effect of recompression on attacking JPEG steganographic schemes \u2013 An experimental study. In: IEEE International Symposium on Circuits and Systems (2007)","DOI":"10.1109\/ISCAS.2007.378341"},{"key":"12_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11922841_3","volume-title":"Digital Watermarking","author":"A. Westfeld","year":"2006","unstructured":"Westfeld, A.: Steganalysis in the presence of weak cryptography and encoding. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 19\u201334. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:57:36Z","timestamp":1558267056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}