{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:10Z","timestamp":1749874090443,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_13","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:08Z","timestamp":1749846188000},"page":"244-257","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CS-Net: A Deep Learning-Based Analysis for\u00a0the\u00a0Cryptography and\u00a0Steganography"],"prefix":"10.1007","author":[{"given":"Duk Young","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kyoungbae","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Hyunji","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yujin","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Seyoung","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"issue":"4","key":"13_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474\u2013481 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Practical steganalysis of digital images: state of the art. In: Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp.\u00a01\u201313 (2002)","DOI":"10.1117\/12.465263"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a0234\u2013239. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp.\u00a059\u201368 (2013)","DOI":"10.1145\/2482513.2482514"},{"issue":"2","key":"13_CR5","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2015","unstructured":"Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221\u2013234 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"13_CR6","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Wu, H.-Z., Shi, Y.-Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Signal Process. Lett."},{"issue":"11","key":"13_CR7","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Yedroudj, M., Comby, F., Chaumont, M.: Yedroudj-net: an efficient CNN for spatial steganalysis. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a02092\u20132096. IEEE (2018)","DOI":"10.1109\/ICASSP.2018.8461438"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"14340","DOI":"10.1109\/ACCESS.2021.3052494","volume":"9","author":"T-S Reinel","year":"2021","unstructured":"Reinel, T.-S., et al.: Gbras-net: a convolutional neural network architecture for spatial image steganalysis. IEEE Access 9, 14340\u201314350 (2021)","journal-title":"IEEE Access"},{"key":"13_CR10","unstructured":"Sharma, H., Sharma, K.K., Chauhan, S.: Steganography techniques using cryptography-a review paper. Int. J. Recent Res. (2015). Aspects Special Issue: Engineering Research Aspects. ISSN 2349-7688"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Dhamija, A., Dhaka, V.: A novel cryptographic and steganographic approach for secure cloud data migration. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp.\u00a0346\u2013351. IEEE (2015)","DOI":"10.1109\/ICGCIoT.2015.7380486"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1007\/s11277-016-3313-x","volume":"89","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar, P., Vijayalakshmi, V., Zayaraz, G.: An improved level of security for DNA steganography using hyperelliptic curve cryptography. Wireless Pers. Commun. 89, 1221\u20131242 (2016)","journal-title":"Wireless Pers. Commun."},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Karthikeyan, B., Kosaraju, A.C., Gupta, S.: Enhanced security in steganography using encryption and quick response code. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp.\u00a02308\u20132312. IEEE (2016)","DOI":"10.1109\/WiSPNET.2016.7566554"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Pillai, B., Mounika, M., Rao, P.J., Sriram, P.: Image steganography method using k-means clustering and encryption techniques. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.\u00a01206\u20131211. IEEE (2016)","DOI":"10.1109\/ICACCI.2016.7732209"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/978-3-030-77870-5_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"A Benamira","year":"2021","unstructured":"Benamira, A., Gerault, D., Peyrin, T., Tan, Q.Q.: A deeper look at machine learning-based cryptanalysis. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 805\u2013835. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_28"},{"key":"13_CR16","first-page":"310","volume":"2021","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Yu, H.: A new neural distinguisher model considering derived features from multiple ciphertext pairs. IACR Cryptol. ePrint Arch. 2021, 310 (2021)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"13_CR17","unstructured":"Hou, Z., Ren, J., Chen, S.: Cryptanalysis of round-reduced Simon32 based on deep learning. Cryptology ePrint Archive (2021)"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-030-88238-9_10","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2021","author":"T Yadav","year":"2021","unstructured":"Yadav, T., Kumar, M.: Differential-ML distinguisher: machine learning based generic extension for\u00a0differential cryptanalysis. In: Longa, P., R\u00e0fols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 191\u2013212. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88238-9_10"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Baksi, A., Breier, J., Dasu, V.A., Hou, X., Kim, H., Seo, H.: New results on machine learning-based distinguishers. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3270396"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-26951-7_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"A Gohr","year":"2019","unstructured":"Gohr, A.: Improving attacks on round-reduced speck32\/64 using deep learning. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 150\u2013179. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_6"},{"key":"13_CR21","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404 (2013). https:\/\/eprint.iacr.org\/2013\/404"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Baksi, A.: Machine learning-assisted differential distinguishers for lightweight ciphers. In: Classical and Physical Security of Symmetric Key Cryptographic Algorithms, pp.\u00a0141\u2013162. Springer, Cham (2022)","DOI":"10.1007\/978-981-16-6522-6_6"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-319-66787-4_15","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., et al.: Gimli: a cross-platform permutation. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 299\u2013320. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_15"},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09398-9","volume":"34","author":"C Dobraunig","year":"2021","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1. 2: lightweight authenticated encryption and hashing. J. Cryptol. 34, 1\u201342 (2021)","journal-title":"J. Cryptol."},{"key":"13_CR25","unstructured":"Zhang, W., et al.: Knot: algorithm specifications and supporting document. Submission to NIST lightweight cryptography project (2019)"},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-319-13051-4_19","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"N Mouha","year":"2014","unstructured":"Mouha, N., Mennink, B., Van Herrewege, A., Watanabe, D., Preneel, B., Verbauwhede, I.: Chaskey: an efficient MAC algorithm for 32-bit microcontrollers. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 306\u2013323. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13051-4_19"},{"issue":"21","key":"13_CR27","doi-asserted-by":"publisher","first-page":"3936","DOI":"10.3390\/math10213936","volume":"10","author":"X Duan","year":"2022","unstructured":"Duan, X., Zhang, C., Ma, Y., Liu, S.: Preprocessing enhancement method for spatial domain steganalysis. Mathematics 10(21), 3936 (2022)","journal-title":"Mathematics"},{"issue":"4\u20135","key":"13_CR28","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/0925-2312(93)90006-O","volume":"5","author":"S-I Amari","year":"1993","unstructured":"Amari, S.-I.: Backpropagation and stochastic gradient descent method. Neurocomputing 5(4\u20135), 185\u2013196 (1993)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:13Z","timestamp":1749846193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}