{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:22:56Z","timestamp":1742930576979,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164347"},{"type":"electronic","value":"9783642164354"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16435-4_11","type":"book-chapter","created":{"date-parts":[[2010,9,30]],"date-time":"2010-09-30T22:29:53Z","timestamp":1285885793000},"page":"133-144","source":"Crossref","is-referenced-by-count":3,"title":["The Influence of the Image Basis on Modeling and Steganalysis Performance"],"prefix":"10.1007","author":[{"given":"Valentin","family":"Schwamberger","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pham Hai Dang","family":"Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bernhard","family":"Sch\u00f6lkopf","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matthias O.","family":"Franz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","first-page":"218","volume-title":"Proceedings of the 1981 Conference on Pattern Recognition and Information Processing","author":"E.H. Adelson","year":"1981","unstructured":"Adelson, E.H., Burt, P.J.: Image data compression with the Laplacian pyramid. In: Proceedings of the 1981 Conference on Pattern Recognition and Information Processing, pp. 218\u2013223. IEEE Computer Society Press, Los Alamitos (1981)"},{"issue":"2","key":"11_CR2","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I. Avcibas","year":"2003","unstructured":"Avcibas, I., Memon, N.D., Sankur, B.: Steganalysis using image quality metrics. IEEE Transactions on Image Processing\u00a012(2), 221\u2013229 (2003)","journal-title":"IEEE Transactions on Image Processing"},{"key":"11_CR3","volume-title":"Textures: A Photographic Album for Artists and Designers","author":"P. Brodatz","year":"1966","unstructured":"Brodatz, P.: Textures: A Photographic Album for Artists and Designers. Dover Publications, New York (1966)"},{"issue":"12","key":"11_CR4","doi-asserted-by":"publisher","first-page":"1688","DOI":"10.1109\/83.806616","volume":"8","author":"R.W. Buccigrossi","year":"1999","unstructured":"Buccigrossi, R.W., Simoncelli, E.P.: Image compression via joint statistical characterization in the wavelet domain. IEEE Transactions on Image Processing\u00a08(12), 1688\u20131701 (1999)","journal-title":"IEEE Transactions on Image Processing"},{"key":"11_CR5","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: A library for support vector machines (2001), software available at \n                  \n                    http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1093\/biomet\/81.3.425","volume":"81","author":"D. Donoho","year":"1993","unstructured":"Donoho, D., Johnstone, I., Johnstone, I.M.: Ideal spatial adaptation by wavelet shrinkage. Biometrika\u00a081, 425\u2013455 (1993)","journal-title":"Biometrika"},{"issue":"365","key":"11_CR7","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/01621459.1979.10481632","volume":"74","author":"S. Geisser","year":"1979","unstructured":"Geisser, S., Eddy, W.F.: A predictive approach to model selection. Journal of the American Statistical Association\u00a074(365), 153\u2013160 (1979)","journal-title":"Journal of the American Statistical Association"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J.J., Holotyak, T.: New blind steganalysis and its implications. In: Security, Steganography, and Watermarking of Multimedia Contents VIII 6072(1), pp. 1\u201313 (February 2006)","DOI":"10.1117\/12.643254"},{"key":"11_CR9","volume-title":"Neural Networks","author":"S. Haykin","year":"1999","unstructured":"Haykin, S.: Neural Networks, 2nd edn. Prentice-Hall, Upper Saddle River (1999)","edition":"2"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1117\/12.584201","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents. Proceedings of SPIE","author":"T. Holotyak","year":"2005","unstructured":"Holotyak, T., Fridrich, J.J., Soukal, D.: Stochastic approach to secret message length estimation in \u00b1k embedding steganography. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents. Proceedings of SPIE, vol.\u00a05681, pp. 673\u2013684. International Society for Optical Engineering, SPIE, San Jose (2005)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/11552055_31","volume-title":"Communications and Multimedia Security","author":"T. Holotyak","year":"2005","unstructured":"Holotyak, T., Fridrich, J.J., Voloshynovskiy, S.: Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.\u00a03677, pp. 273\u2013274. Springer, Heidelberg (2005)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-30114-1_8","volume-title":"Information Hiding","author":"A.D. Ker","year":"2004","unstructured":"Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 97\u2013115. Springer, Heidelberg (2004)"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TIFS.2005.863485","volume":"1","author":"S. Lyu","year":"2006","unstructured":"Lyu, S., Farid, H.: Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security\u00a01(1), 111\u2013119 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11_CR14","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-28650-9_4","volume-title":"Advanced Lectures on Machine Learning","author":"C.E. Rasmussen","year":"2004","unstructured":"Rasmussen, C.E.: Gaussian processes in machine learning. In: Bousquet, O., von Luxburg, U., R\u00e4tsch, G. (eds.) Machine Learning 2003. LNCS (LNAI), vol.\u00a03176, pp. 63\u201371. Springer, Heidelberg (2004)"},{"key":"11_CR15","volume-title":"Gaussian Processes for Machine Learning","author":"C.E. Rasmussen","year":"2006","unstructured":"Rasmussen, C.E., Williams, C.K.I.: Gaussian Processes for Machine Learning. MIT Press, Cambridge (2006)"},{"key":"11_CR16","volume-title":"Proceedings of the 2010 Workshop on Multimedia and Security","author":"V. Schwamberger","year":"2010","unstructured":"Schwamberger, V., Franz, M.O.: Simple algorithmic modifications for improving blind steganalysis performance. In: Proceedings of the 2010 Workshop on Multimedia and Security, MM&Sec 2010. ACM Press, New York (2010)"},{"key":"11_CR17","volume-title":"Support Vector Machines, Regularization, Optimization, and Beyond","author":"B. Sch\u00f6lkopf","year":"2002","unstructured":"Sch\u00f6lkopf, B., Smola, A.J.: Learning with Kernels. In: Support Vector Machines, Regularization, Optimization, and Beyond, MIT Press, Cambridge (2002)"},{"key":"11_CR18","volume-title":"Subband Image Coding","author":"E.P. Simoncelli","year":"1990","unstructured":"Simoncelli, E.P., Adelson, E.H.: Subband transforms. In: Woods, J.W. (ed.) Subband Image Coding. Kluwer Academic Publishers, Norwell (1990)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16435-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T07:47:03Z","timestamp":1553154423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16435-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164347","9783642164354"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16435-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}