{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:54:39Z","timestamp":1770227679713,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819698714","type":"print"},{"value":"9789819698721","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9872-1_17","type":"book-chapter","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T14:35:09Z","timestamp":1753281309000},"page":"201-215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Steganalysis Framework for Enhancing Model Generalization Performance"],"prefix":"10.1007","author":[{"given":"Ruiyao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Linna","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yaotian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"issue":"2","key":"17_CR1","first-page":"551","volume":"32","author":"J Chen","year":"2020","unstructured":"Chen, J., Fu, Z., Zhang, W., et al.: Review of image steganalysis based on deep learning. J. Softw. 32(2), 551\u2013578 (2020)","journal-title":"J. Softw."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Kheddar, H., Hemis, M., Himeur, Y., et al.: Deep learning for steganalysis of diverse data types: a review of methods, taxonomy, challenges and future directions. Neurocomputing 581(C) (2024)","DOI":"10.1016\/j.neucom.2024.127528"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Yedroudj, M., Comby, F., Chaumont, M.: Yedroudj-Net: an efficient CNN for spatial steganalysis. In: Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada, pp. 2092--2096 (2018)","DOI":"10.1109\/ICASSP.2018.8461438"},{"issue":"5","key":"17_CR4","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181\u20131193 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1109\/TIFS.2019.2936913","volume":"15","author":"R Zhang","year":"2020","unstructured":"Zhang, R., Zhu, F., Liu, J., et al.: Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans. Inf. Forensics Secur. 15, 1138\u20131150 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TIFS.2020.3013204","volume":"16","author":"W You","year":"2021","unstructured":"You, W., Zhang, H., Zhao, X.: A siamese CNN for image steganalysis. IEEE Trans. Inf. Forensics Secur. 16, 291\u2013306 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.1109\/LSP.2022.3201727","volume":"29","author":"S Weng","year":"2022","unstructured":"Weng, S., Chen, M., Yu, L., et al.: Lightweight and effective deep image steganalysis network. IEEE Signal Process. Lett. 29, 1888\u20131892 (2022)","journal-title":"IEEE Signal Process. Lett."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Luo, G., Wei, P., Zhu, S., et al.: Image steganalysis with convolutional vision transformer. In: ICASSP 2022 - IEEE International Conference on Acoustics, Speech and Signal Processing, Singapore, pp. 3089--3093 (2022)","DOI":"10.1109\/ICASSP43922.2022.9747091"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2024.3493615","volume":"20","author":"T Fu","year":"2025","unstructured":"Fu, T., Chen, L., Jiang, Y., et al.: Image steganalysis based on dual-path enhancement and fractal downsampling. IEEE Trans. Inf. Forensics Secur. 20, 1\u201316 (2025)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"9970","DOI":"10.1109\/TIFS.2024.3486027","volume":"19","author":"K Wei","year":"2024","unstructured":"Wei, K., Luo, W., Huang, J.: Color image steganalysis based on pixel difference convolution and enhanced transformer with selective pooling. IEEE Trans. Inf. Forensics Secur. 19, 9970\u20139983 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"199","DOI":"10.3390\/biomimetics8020199","volume":"8","author":"Z Wen","year":"2023","unstructured":"Wen, Z., Lin, W., Wang, T., et al.: Distract your attention: multi-head cross attention network for facial expression recognition. Biomimetics 8(2), 199 (2023)","journal-title":"Biomimetics"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Li, Y., Hu, P., Liu, Z., et al.: Contrastive clustering. Proc. AAAI Conf. Artif. Intell. 35(10), 8547--8555 (2021)","DOI":"10.1609\/aaai.v35i10.17037"},{"key":"17_CR13","doi-asserted-by":"publisher","unstructured":"Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (eds.) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol. 2578, pp. 340\u2013354. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36415-3_22","DOI":"10.1007\/3-540-36415-3_22"},{"issue":"11","key":"17_CR14","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., et al.: Learning and transferring representations for image steganalysis using convolutional neural network. In: Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, USA, pp. 2752-2756 (2016)","DOI":"10.1109\/ICIP.2016.7532860"},{"issue":"5","key":"17_CR16","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Wu, H., Shi, Y.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"19471","DOI":"10.1007\/s11042-021-11862-4","volume":"81","author":"S Huang","year":"2022","unstructured":"Huang, S., Zhang, M., Ke, Y., et al.: Image steganalysis based on attention augmented convolution. Multimed. Tools Appl. 81, 19471\u201319490 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/TIFS.2024.3470651","volume":"19","author":"K Lin","year":"2024","unstructured":"Lin, K., Li, B., Li, W., et al.: Constructing an intrinsically robust steganalyzer via learning neighboring feature relationships and self-adversarial adjustment. IEEE Trans. Inf. Forensics Secur. 19, 9390\u20139405 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR19","doi-asserted-by":"publisher","unstructured":"Zhang, X., Kong, X., Wang, P., Wang, B. (2020). Cover-Source Mismatch in Deep Spatial Steganalysis. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-43575-2_6","DOI":"10.1007\/978-3-030-43575-2_6"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Yu, L., Zhang, Z., Weng, S., et al.: A deep steganalysis network combining source-supervised and target-unsupervised information for cover-source mismatch. Expert Syst. Appl. 255(D), 124790 (2024)","DOI":"10.1016\/j.eswa.2024.124790"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) Information Hiding. IH 2011. Lecture Notes in Computer Science, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_5","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"17_CR22","unstructured":"Bas, P., Furon, T.: BOWS-2 (2007). http:\/\/bows2.ec-lille.fr"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Cogranne, R., Giboulot, Q., Bas, P.: The ALASKA steganalysis challenge: a first step towards steganalysis. In: Proceedings of the ACM Workshop Information Hiding Multimedia Security (IH&MMSec 2019), pp. 125\u2013137 (2019)","DOI":"10.1145\/3335203.3335726"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234\u2013239 (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"17_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1 (2014)","journal-title":"EURASIP J. Inf. Secur."},{"key":"17_CR26","doi-asserted-by":"publisher","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol. 6387, pp. 161\u2013177. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16435-4_13","DOI":"10.1007\/978-3-642-16435-4_13"},{"issue":"2","key":"17_CR27","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221\u2013234 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., et al.: A new cost function for spatial image steganography. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), pp. 4206\u20134210 (2014)","DOI":"10.1109\/ICIP.2014.7025854"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9872-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T06:23:32Z","timestamp":1770186212000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9872-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698714","9789819698721"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9872-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}