{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:59Z","timestamp":1725538919091},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_16","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"184-198","source":"Crossref","is-referenced-by-count":2,"title":["Steganalysis Based on Difference Image"],"prefix":"10.1007","author":[{"given":"Yifeng","family":"Sun","sequence":"first","affiliation":[]},{"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"16_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J. Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray-scale Images. IEEE Multimedia\u00a08(4), 22\u201328 (2001)","journal-title":"IEEE Multimedia"},{"issue":"7","key":"16_CR2","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography via Sample Pair Analysis. IEEE Trans. on Signal Processing\u00a051(7), 1995\u20132007 (2003)","journal-title":"IEEE Trans. on Signal Processing"},{"issue":"10","key":"16_CR3","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1016\/S0165-1684(03)00169-5","volume":"83","author":"T. Zhang","year":"2003","unstructured":"Zhang, T., Ping, X.: A New Approach to Reliable Detection of LSB Steganography in Natural Images. Signal Process.\u00a083(10), 2085\u20132093 (2003)","journal-title":"Signal Process."},{"key":"16_CR4","unstructured":"Luo, X., Wang, Q., Yang, C., Liu, F.: Detection of LTSB Steganography Based on Quartic Equation. In: Proceedings of ICACT 2006, pp. 20\u201322 (2006)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Avc\u0131ba, I., Memon, N., Sankur, B.: Steganalysis of Watermarking Techniques Using Image Quality Metrics. In: Proceedings of Security and Watermarking of Multimedia Contents II. SPIE, vol.\u00a04314, pp. 523\u2013531 (2000)","DOI":"10.1117\/12.435436"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Farid, H.: Detecting Hidden Messages Using Higher-order Statistical Models. In: Proceedings of IEEE ICIP 2002, pp. 905\u2013908 (2002)","DOI":"10.1109\/ICIP.2002.1040098"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/11552055_31","volume-title":"Communications and Multimedia Security","author":"T. Holotyak","year":"2005","unstructured":"Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.\u00a03677, pp. 273\u2013274. Springer, Heidelberg (2005)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Holotyak, T.: New Blind Steganalysis and its Implications. In: Proceedings of Security, Steganography, and Watermarking of Multimedia Contents. SPIE, pp. 1\u201313 (2006)","DOI":"10.1117\/12.643254"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Harmsen, J., Pearlman, W.: Steganalysis of Additive Noise Modelable Information Hiding. In: Proceedings of. Security, Steganography, and Watermarking of Multimedia Contents VI. SPIE, pp. 131\u2013142 (2003)","DOI":"10.1117\/12.476813"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Xuan, G., Shi, Y., Gao, J., et al.: Steganalysis based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Function. In: Proceedings of Information Hiding Workshop, Barcelona, Spain, pp. 262\u2013277 (2005)","DOI":"10.1007\/11558859_20"},{"issue":"1","key":"16_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TIFS.2006.890517","volume":"2","author":"Y. Wang","year":"2007","unstructured":"Wang, Y., Moulin, P.: Optimized Feature Extraction for Learning-based Image Steganalysis. IEEE Trans. Information Forensics and Security\u00a02(1), 31\u201345 (2007)","journal-title":"IEEE Trans. Information Forensics and Security"},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/TIFS.2006.873595","volume":"1","author":"K. Sullivan","year":"2006","unstructured":"Sullivan, K., Madhow, U., Chandrasekaran, S., et al.: Steganalysis for Markov Cover Data with Applications to Images. IEEE Trans. Information Forensics and Security\u00a01(2), 275\u2013287 (2006)","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Xuan, G., Cui, X., Shi, Y., et al.: JPEG Steganalysis based on Classwise Non-principal Components Analysis and Mutil-directional Markov Model. In: Proceedings of IEEE ICME 2007, pp. 903\u2013906 (2007)","DOI":"10.1109\/ICME.2007.4284797"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-74124-4_17","volume-title":"Information Hiding","author":"Y. Shi","year":"2007","unstructured":"Shi, Y., Chen, C., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"issue":"6","key":"16_CR15","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"A. Ker","year":"2005","unstructured":"Ker, A.: Steganalysis of LSB Matching In Grayscale Images. IEEE Signal processing letters\u00a012(6), 441\u2013444 (2005)","journal-title":"IEEE Signal processing letters"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Chen, C., Shi, Y., Chen, W., et al.: Statistical Moments based Universal Steganalysis Using JPEG 2-D Array and 2-D Characteristic Function. In: Proceedings of IEEE ICIP 2006, pp. 105\u2013108 (2006)","DOI":"10.1109\/ICIP.2006.312383"},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.patcog.2007.06.005","volume":"41","author":"Q. Liu","year":"2008","unstructured":"Liu, Q., Sung, A.H., Chen, Z., Xu, J.: Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images. Pattern Recognition\u00a041, 56\u201366 (2008)","journal-title":"Pattern Recognition"},{"issue":"8","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"L.M. Marvel","year":"1999","unstructured":"Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread Spectrum Image Steganography. IEEE Trans. on Image Processing\u00a08(8), 1075\u20131083 (1999)","journal-title":"IEEE Trans. on Image Processing"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-30114-1_8","volume-title":"Information Hiding","author":"A. Ker","year":"2004","unstructured":"Ker, A.: Improved Detection of LSB Steganography in Grayscale Images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 97\u2013115. Springer, Heidelberg (2004)"},{"key":"16_CR20","unstructured":"Huang, J., Mumford, D.: Statistics of Natural Images and Models. In: Proceedings of IEEE Conference Computer Vision and Pattern Recognition, pp. 541\u2013547 (1999)"},{"key":"16_CR21","volume-title":"Finite Mixture Models","author":"G. McLachlan","year":"2001","unstructured":"McLachlan, G., David, P.: Finite Mixture Models. Wiley, New York (2001)"},{"key":"16_CR22","unstructured":"USDA NPCS Photo Gallery, http:\/\/photogallery.nrcs.nsda.gov"},{"key":"16_CR23","first-page":"773","volume-title":"Handbook of statistics: Classification, Pattern Recognition and Reduction of Dimensionality","author":"M. Ben-Bassat","year":"1987","unstructured":"Ben-Bassat, M.: Use of Distance Measures, Information Measures and Error Bounds on Feature Evaluation. In: Krishaiah, P.R., Kanal, L.N. (eds.) Handbook of statistics: Classification, Pattern Recognition and Reduction of Dimensionality, pp. 773\u2013791. North-Holland, Amsterdam (1987)"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11551492_1","volume-title":"Digital Watermarking","author":"J. He","year":"2005","unstructured":"He, J., Huang, J.: A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 1\u201314. Springer, Heidelberg (2005)"},{"issue":"suppl.","key":"16_CR25","first-page":"48","volume":"37","author":"D. Chen","year":"2007","unstructured":"Chen, D., Wang, Y.: Universal Steganalysis Algorithm for Additive Noise Modelable Stegranography in Spacial Domain. Journal of Southeast University (Natural Science Edition)\u00a037(suppl.), 48\u201352 (2007)","journal-title":"Journal of Southeast University (Natural Science Edition)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Liu, Z., Pan, X., Shi, L., et al.: Effective Steganalysis Based on Statistical Moments of Differential Characteristic Function. In: Proceedings of IEEE ICCIS 2006, pp. 1195\u20131198 (2006)","DOI":"10.1109\/ICCIAS.2006.295244"},{"key":"16_CR27","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1117\/12.479739","volume-title":"Proceedings of Security and Watermarking of Multimedia Contents V","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M.: Digital Image Steganography Using Stochastic Modulation. In: Proceedings of Security and Watermarking of Multimedia Contents V, vol.\u00a05020, pp. 191\u2013202. SPIE, San Jose (2003)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:37:11Z","timestamp":1558564631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}