{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T20:10:21Z","timestamp":1739304621438,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036873"},{"type":"electronic","value":"9783642036880"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_19","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T11:03:43Z","timestamp":1250507023000},"page":"199-210","source":"Crossref","is-referenced-by-count":6,"title":["Multi-class Blind Steganalysis Based on Image Run-Length Analysis"],"prefix":"10.1007","author":[{"given":"Jing","family":"Dong","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tieniu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"19_CR1","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/s00530-003-0100-9","volume":"9","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis: Estimating secret message length. ACM Multimedia Systems Journal. Special issue on Multimedia Securrity\u00a09(3), 288\u2013302 (2003)","journal-title":"ACM Multimedia Systems Journal. Special issue on Multimedia Securrity"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-36415-3_23","volume-title":"Information Hiding","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Xiaolin, W., Wang, Z.: Detection of lsb steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 355\u2013374. Springer, Heidelberg (2003)"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Ker, A.: Resampling and the detection of lsb matching in colour bitmaps. In: Proceedings of SPIE Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents VII (2005)","DOI":"10.1117\/12.586622"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-36415-3_22","volume-title":"Information Hiding","author":"H. Farid","year":"2003","unstructured":"Farid, H., Siwei, L.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 340\u2013354. Springer, Heidelberg (2003)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Practical steganalysis of digital images \u2014 state of the art. In: Security and Watermarking of Multimedia Contents. SPIE, vol.\u00a04675, pp. 1\u201313 (2002)","DOI":"10.1117\/12.465263"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, pp. 131\u2013142 (2003)","DOI":"10.1117\/12.476813"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., et al.: Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, andneural network. In: ICME 2005, pp. 269\u2013272 (2005)","DOI":"10.1109\/ICME.2005.1521412"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Dong, J., Tan, T.N.: Blind image steganalysis based on run-length histogram analysis. In: 15th International Conference of Image Processing 2008 (ICIP 2008), pp. 2064\u20132067 (2008)","DOI":"10.1109\/ICIP.2008.4712192"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/11551492_4","volume-title":"Digital Watermarking","author":"T. Pevny","year":"2005","unstructured":"Pevny, T., Fridrich, J.: Towards muti-class steganalyzer for jpeg images. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 39\u201353. Springer, Heidelberg (2005)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Salle","year":"2004","unstructured":"Salle, P.: Model based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Pevny, T., Fridrich, J.: Determining the stego algorithm for jpeg images. In: Proceddings of Information Security, vol.\u00a0153, pp. 77\u201386 (2006)","DOI":"10.1049\/ip-ifs:20055147"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-74124-4_17","volume-title":"Information Hiding","author":"Y.Q. Shi","year":"2006","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A markov process based approach to effective attacking jpeg steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 249\u2013264. Springer, Heidelberg (2006)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Savoldi, A., Gubian, P.: A markov process based approach to effective attacking jpeg steganography. In: Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing, vol.\u00a02, pp. 93\u201396 (2007)","DOI":"10.1109\/IIHMSP.2007.4457661"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: High capacity despite better steganalysis(f5). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"19_CR15","unstructured":"Provos, N.: Software, http:\/\/www.outguess.org"},{"key":"19_CR16","unstructured":"Latham, A.: Software, http:\/\/linux01.gwdg.de\/~alatham\/stego.html"},{"key":"19_CR17","unstructured":"Hetzl, S.: Software, http:\/\/steghide.sourceforge.net"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Wang, P., Liu, F., Wang, G., Sun, Y., Gong, D.: Multi-class steganalysis for jpeg stego algorithms. In: Proceedings of the 15th International Conference on Image Processing, pp. 2076\u20132079 (2008)","DOI":"10.1109\/ICIP.2008.4712195"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Galloway, M.M.: Texture analysis using gray level run lengths. In: Cornput. Graph. Image Proc., vol.\u00a04, pp. 171\u2013179 (1975)","DOI":"10.1016\/S0146-664X(75)80008-6"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Cortes, C., Vapnik, V.: Support-vector network. In: Proceedings of SPIE Electronic Imageing, Security, Steganography and Watermarking of Nultimedia Contents VII, vol.\u00a020, pp. 273\u2013297 (1995)","DOI":"10.1007\/BF00994018"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Benchmarking steganographic and steganalysis techniques. In: Proceedings of SPIE Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents VII (2005)","DOI":"10.1117\/12.587375"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J. Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 67\u201381. Springer, Heidelberg (2004)"},{"key":"19_CR23","unstructured":"Hsu, C., Kin, C.: A comparision of methods for multi-class support vector machines. Technical Report, Department of Computer Science and Information Engineering, National Taiwan University, http:\/\/citeseer.ist.psu.edu\/hsu01comparision.html"},{"key":"19_CR24","unstructured":"Schaefer, G., Stich, M.: Ucid - an uncompressed colour image database. In: Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp. 472\u2013480 (2004)"},{"key":"19_CR25","unstructured":"Database, U.C.I.: http:\/\/vision.cs.aston.ac.uk\/datasets\/ucid\/ucid.html"},{"issue":"12","key":"19_CR26","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectru, watermarking for multimedia. IEEE Trans.Image Process.\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans.Image Process."},{"key":"19_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-77370-2_2","volume-title":"Information Hiding","author":"K. Solanki","year":"2008","unstructured":"Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 16\u201331. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T19:30:20Z","timestamp":1739302220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}