{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T20:10:18Z","timestamp":1741464618704,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642232138"},{"type":"electronic","value":"9783642232145"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23214-5_85","type":"book-chapter","created":{"date-parts":[[2011,8,16]],"date-time":"2011-08-16T08:55:52Z","timestamp":1313484952000},"page":"663-671","source":"Crossref","is-referenced-by-count":0,"title":["Statistical Modeling for LSB-Based Image Steganalysis: A Systematic Perspective"],"prefix":"10.1007","author":[{"given":"Xiaoming","family":"Yao","sequence":"first","affiliation":[]},{"given":"Wencai","family":"Du","sequence":"additional","affiliation":[]},{"given":"Taijun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Longjuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Honglei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hanwei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zequn","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"85_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy\u00a01(3), 32\u201344 (2003)","journal-title":"IEEE Security and Privacy"},{"issue":"1","key":"85_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","volume":"192","author":"C. Cachin","year":"2004","unstructured":"Cachin, C.: An information-theoretic model for steganography. Information and Computation\u00a0192(1), 41\u201356 (2004)","journal-title":"Information and Computation"},{"key":"85_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"A. Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201376. Springer, Heidelberg (2000)"},{"key":"85_CR4","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Kurtosis"},{"key":"85_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-36415-3_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2003","unstructured":"Westfeld, A.: Detecting low embedding rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 324\u2013339. Springer, Heidelberg (2003)"},{"key":"85_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Grayscale and Color Images. In: Proc. ACM Workshop Multimedia Security, Ottawa, ON, Canada, pp. 25\u201330 (October 2001)","DOI":"10.1145\/1232454.1232466"},{"issue":"7","key":"85_CR7","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S. Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing\u00a051(7), 1995\u20132007 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"85_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-540-45215-7_34","volume-title":"Computer Network Security","author":"X. Zhang","year":"2003","unstructured":"Zhang, X., Wang, S., Zhang, K.: Steganography with Least Histogram Abnormality. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 395\u2013406. Springer, Heidelberg (2003)"},{"key":"85_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/11558859_24","volume-title":"Information Hiding","author":"S. Draper","year":"2005","unstructured":"Draper, S., Ishwar, P., Molnar, D., Prabhakaran, V., Ramchandran, K., Schonberg, D., Wagner, D.: An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 327\u2013341. Springer, Heidelberg (2005)"},{"key":"85_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, T., Ping, X.: Reliable detection of LSB steganography based on the difference image histogram. In: Proc. Of IEEE conference on Acoustics, Speech and Signal Processing (ICASSP 2003), vol.\u00a03, pp. 545\u2013548 (2003)","DOI":"10.1109\/ICASSP.2003.1199532"},{"issue":"3","key":"85_CR11","doi-asserted-by":"publisher","first-page":"200","DOI":"10.4304\/jmm.5.3.200-207","volume":"5","author":"Z. Li","year":"2010","unstructured":"Li, Z., Lu, K., Zeng, X., Pan, X.: A Blind Stegananlytic Scheme Based on DCT and Spatial Domain for JPEG Images. Journal of Multimedia\u00a05(3), 200\u2013207 (2010)","journal-title":"Journal of Multimedia"},{"key":"85_CR12","doi-asserted-by":"crossref","unstructured":"Chen, X., Wang, Y., Tan, T., Guo, L.: Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix. In: Proc. Of 18th International Conference on Pattern Recognition (ICPR 2006), vol.\u00a03, pp. 1107\u20131110 (August 2006)","DOI":"10.1109\/ICPR.2006.332"},{"key":"85_CR13","doi-asserted-by":"crossref","unstructured":"Abolghasemi, M., Aghainia, H., Faez, K., Mehrabi, M.A.: Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. In: Proc. Of International Conference on Intelligent Information Hiding and Multimedia signal Processing (IIHMSP 2008), pp. 1527\u20131530 (August 2008)","DOI":"10.1109\/IIH-MSP.2008.242"},{"key":"85_CR14","unstructured":"Xuan, G., Shi, Y., Huang, C., Fu, D., et al.: Steganalysis Using High-Dimensional Features Derived from Co-Occurrence Matrix and Class-wise Non- Principal Components Analysis (CNPCA), http:\/\/www.grxuan.org\/english\/IWDW2006163.pdf"},{"key":"85_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-36415-3_18","volume-title":"Information Hiding","author":"E. Franz","year":"2003","unstructured":"Franz, E.: Steganography Preserving Statistical Properties. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 278\u2013294. Springer, Heidelberg (2003)"},{"key":"85_CR16","unstructured":"Provos, N.: Defending against statistical steganalysis, CITI Techreport 01-4, Center for Information Technology Integration, University of Michigan (2001)"},{"key":"85_CR17","doi-asserted-by":"crossref","unstructured":"Eggers, J.J., B\u00c4auml, R., Girod, B.: A communications approach to image steganography. In: Proc. Of SPIE, Security and Watermarking of Multimedia Contents IV, San Jose, USA, vol.\u00a04675, pp. 1\u201312 (January 2002), http:\/\/www.lit.lnt.de\/papers\/EI2002-stego.pdf","DOI":"10.1117\/12.465284"},{"issue":"2","key":"85_CR18","first-page":"189","volume":"5","author":"G. Tang","year":"2010","unstructured":"Tang, G., Liu, J.: A Secure Steganography Preserving High Order Statistics. Journal of Multimedia\u00a05(2), 189\u2013196 (2010)","journal-title":"Journal of Multimedia"},{"key":"85_CR19","doi-asserted-by":"crossref","unstructured":"Harmsen, J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proceedings of the SPIE Security Steganography, and Watermarking of Multimedia Contents VI, vol.\u00a05020, pp. 131\u2013142 (2003)","DOI":"10.1117\/12.476813"},{"issue":"7","key":"85_CR20","doi-asserted-by":"publisher","first-page":"646","DOI":"10.4304\/jcp.4.7.646-653","volume":"4","author":"J. Zhang","year":"2009","unstructured":"Zhang, J., Hu, Y., Yuan, Z.: Detection of LSB Matching Steganography using the Envelope of Histogram. Journal of Computers\u00a04(7), 646\u2013653 (2009)","journal-title":"Journal of Computers"},{"issue":"3","key":"85_CR21","first-page":"59","volume":"4","author":"M. Mahdavi","year":"2008","unstructured":"Mahdavi, M., Samavi, S., Zaker, N., Modares-Hashemi, M.: Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram. Iranian Journal of Electrical and Electronic Engineering\u00a04(3), 59\u201370 (2008)","journal-title":"Iranian Journal of Electrical and Electronic Engineering"},{"issue":"1","key":"85_CR22","first-page":"367","volume":"1","author":"T.H. Manjula Devi","year":"2009","unstructured":"Manjula Devi, T.H., Manjunatha Reddy, H.S., Raja Venugopal, K.B., Patnaik, L.M.: Detecting Original Image Using Histogram, DFT and SVM. International Journal of Recent Trends in Engineering\u00a01(1), 367\u2013371 (2009)","journal-title":"International Journal of Recent Trends in Engineering"},{"issue":"2","key":"85_CR23","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I. Avcibas","year":"2003","unstructured":"Avcibas, I., Memon, N., Sankur, B.: Steganalysis Using Image Quality Metrics. IEEE Transactions on Image Processing\u00a012(2), 221\u2013229 (2003)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"85_CR24","first-page":"1","volume":"11","author":"B. Prakash Battula","year":"2010","unstructured":"Prakash Battula, B., Satya Prasad, R.: Essentials of Image Steganalysis Measures. Journal of Theoretical and Applied Information Technology\u00a011(1), 1\u20139 (2010)","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"17","key":"85_CR25","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1155\/ASP.2005.2749","volume":"2005","author":"I. Avcibas","year":"2005","unstructured":"Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. EURASIP Journal on Applied Signal Processing\u00a02005(17), 2749\u20132757 (2005)","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"85_CR26","unstructured":"Farid, H.: Detecting Steganographic Messages in Digital Images. TR2001-412, Dartmouth College, Computer Science, pp. 1\u20139 (2001), http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.2.6548"},{"issue":"3","key":"85_CR27","first-page":"119","volume":"2","author":"J. Barbier","year":"2006","unstructured":"Barbier, J., Filiol, E., Mayoura, K.: New Features for Specific JPEG Steganalysis. International Journal of Mathematical and Computer Sciences\u00a02(3), 119\u2013124 (2006)","journal-title":"International Journal of Mathematical and Computer Sciences"},{"key":"85_CR28","doi-asserted-by":"crossref","unstructured":"Miche, Y., Bas, P., Lendasse, A., Jutten, C., Simula, O.: Reliable Steganalysis Using a Minimum Set of Samples and Features. EURASIP Journal on Information Security 2009, Article ID 901381, 13 pages (2009), doi:10.1155\/2009\/901381","DOI":"10.1155\/2009\/901381"}],"container-title":["Communications in Computer and Information Science","Applied Informatics and Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23214-5_85","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T19:46:50Z","timestamp":1741463210000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23214-5_85"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642232138","9783642232145"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23214-5_85","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}