{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T05:06:04Z","timestamp":1738904764250,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_8","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"87-98","source":"Crossref","is-referenced-by-count":7,"title":["Fusion Based Blind Image Steganalysis by Boosting Feature Selection"],"prefix":"10.1007","author":[{"given":"Jing","family":"Dong","sequence":"first","affiliation":[]},{"given":"Xiaochuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Tieniu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","first-page":"26","volume-title":"Computer","author":"N.F. Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Exploring steganography: Seeing the unseen. In: Computer, vol.\u00a031, pp. 26\u201334. IEEE Computer Society, Los Alamitos (1998)"},{"key":"8_CR2","unstructured":"Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323\u2013336 (2001)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Practical steganalysis of digital images \u2014 state of the art. In: Security and Watermarking of Multimedia Contents, vol.\u00a0SPIE-4675, pp. 1\u201313 (2002)","DOI":"10.1117\/12.465263"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Tzschoppe, R., Aauml, R.B.: Steganographic system based on higher-order statistics. In: Proceedings of SPIE,Security and Watermarking of Multimedia Contents V,USA, vol.\u00a05020 (2003)","DOI":"10.1117\/12.477301"},{"key":"8_CR5","unstructured":"Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: 5th International Workshop on Information Hiding (2002)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, pp. 131\u2013142 (2003)","DOI":"10.1117\/12.476813"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, pp. 1\u201313 (2006)","DOI":"10.1117\/12.643254"},{"key":"8_CR8","unstructured":"Friedma, F., Hastie, T.: Additive logistic regression: a statistical view of boosting (1998)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Tieu, K., Viola, P.: Boosting image retrieval. In: IEEE Conf.on Computer Vision and Pattern Recognition, pp. 228\u2013235 (2002)","DOI":"10.1109\/CVPR.2000.855824"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A.K. Jain","year":"2005","unstructured":"Jain, A.K.: Score normalization in multimodal biometric systems. Pattern Recognition\u00a038, 2270\u20132285 (2005)","journal-title":"Pattern Recognition"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Kharrazi, M.: Improving steganalysis by fusion techniques: A case study with image steganography. In: Tran. On Data Hiding and Multimedia Security, pp. 123\u2013137 (2006)","DOI":"10.1117\/12.645510"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Xuan, G., Shi, Y.Q.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristics functions. In: Proc. Information Hiding Workshop, pp. 262\u2013277 (2005)","DOI":"10.1007\/11558859_20"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., et al.: Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image,andneural network. In: ICME 2005, pp. 269\u2013272 (2005)","DOI":"10.1109\/ICME.2005.1521412"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/TIFS.2006.873595","volume":"1","author":"K. Sullivan","year":"2006","unstructured":"Sullivan, K., et al.: Steganalysis for markov cover data with applications to images. IEEE Trans.Inf. Forensics Security\u00a01, 275\u2013287 (2006)","journal-title":"IEEE Trans.Inf. Forensics Security"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Chen, X.C., Wang, Y.H., Guo, L., Tan, T.N.: Blind image steganalysis based on statistical analysis of empirical matrix. In: ICPR (3) 2006, pp. 1107\u20131110 (2006)","DOI":"10.1109\/ICPR.2006.332"},{"key":"8_CR16","unstructured":"Joachims, T.: Making large-scale svm learning practical,in adavances in kernel methods-support vector learning. In: Scholkopf, B., Burges, C. (eds.). MIT Press, Cambridge (1999)"},{"issue":"12","key":"8_CR17","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectru, watermarking for multimedia. IEEE Trans.Image Process\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans.Image Process"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1049\/el:19980545","volume":"34","author":"J. Huang","year":"1998","unstructured":"Huang, J., Shi, Y.Q.: Adaptive image watermarking scheme based on visual masking. Electron, Letter\u00a034, 748\u2013750 (1998)","journal-title":"Electron, Letter"},{"key":"8_CR19","unstructured":"Lie, W.N., Chang, L.C.: Data hiding in images with adaptive numbers of least significant bits based on human visual system. In: Proc. IEEE Int. Conf. Image Processing, pp. 286\u2013290 (1999)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Chen, B., Wornell, G.W.: Digital watermarking and information embedding using dither modulation. In: Proceedings of IEEE MMSP, pp. 273\u2013278 (1998)","DOI":"10.1109\/MMSP.1998.738946"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Piva, A., Barni, M., Bartolini, E., Cappellini, V.: Dct-based watermark recovering without resorting to the uncorrupted original image. In: Proc. ICIP 1997, vol.\u00a01, p. 520 (1998)","DOI":"10.1109\/ICIP.1997.647964"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:57:27Z","timestamp":1738821447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}