{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T04:18:10Z","timestamp":1747714690010,"version":"3.40.5"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2015,2,26]],"date-time":"2015-02-26T00:00:00Z","timestamp":1424908800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s00034-015-0007-7","type":"journal-article","created":{"date-parts":[[2015,2,25]],"date-time":"2015-02-25T08:23:16Z","timestamp":1424852596000},"page":"3305-3324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Steganalysis of SS Steganography: Hidden Data Identification and Extraction"],"prefix":"10.1007","volume":"34","author":[{"given":"Ming","family":"Li","sequence":"first","affiliation":[]},{"given":"Qian","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,26]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"\u0130 Avc\u0131ba\u015f","year":"2003","unstructured":"\u0130. Avc\u0131ba\u015f, N. Memon, B. Sankur, Steganalysis using image quality metrics. IEEE Trans. Image Process. 12, 221\u2013229 (2003)","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR2","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1109\/83.918568","volume":"10","author":"M Barni","year":"2001","unstructured":"M. Barni, F. Bartolini, A. De Rosa, A. Piva, A new decoder for the optimum recovery of nonadditive watermarks. IEEE Trans. Image Process. 10, 755\u2013766 (2001)","journal-title":"IEEE Trans. Image Process."},{"doi-asserted-by":"crossref","unstructured":"C. Cachin, An information-theoretic model for steganography, in Proc. 2nd Int. Workshop Inf. Hiding, (Portland, OR, Apr. 1998), pp. 306\u2013318","key":"7_CR3","DOI":"10.1007\/3-540-49380-8_21"},{"key":"7_CR4","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1162\/089976699300016863","volume":"11","author":"JF Cardoso","year":"1999","unstructured":"J.F. Cardoso, High-order contrasts for independent component analysis. Neural Computation 11, 157\u2013192 (1999)","journal-title":"Neural Computation"},{"key":"7_CR5","volume-title":"Elements of Information Theory","author":"TM Cover","year":"2006","unstructured":"T.M. Cover, J.A. Thomas, Elements of Information Theory, 2nd edn. (John Wiley, Hoboken, 2006)","edition":"2"},{"key":"7_CR6","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"I.J. Cox, J. Kilian, F.T. Leighton, T. Shannon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR7","volume-title":"Pattern Classification","author":"RO Duda","year":"2000","unstructured":"R.O. Duda, P.E. Hart, D.G. Stork, Pattern Classification, 2nd edn. (Wiley, Hoboken, 2000)","edition":"2"},{"doi-asserted-by":"crossref","unstructured":"H. Farid, Detecting hidden messages using higher-order statistical models, in itProc. IEEE Intern. Conf. Image Process. (ICIP), (New York, Sept. 2002), pp. 905\u2013908","key":"7_CR8","DOI":"10.1109\/ICIP.2002.1040098"},{"key":"7_CR9","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TIP.2004.823830","volume":"13","author":"C Fei","year":"2004","unstructured":"C. Fei, D. Kundur, R.H. Kwong, Analysis and design of watermarking algorithms for improved resistance to compression. IEEE Trans. Image Process. 13, 126\u2013144 (2004)","journal-title":"IEEE Trans. Image Process."},{"unstructured":"T. Filler, T. Pevny, P. Bas. BOSS, Break Our Steganography System. http:\/\/www.agents.cz\/boss\/","key":"7_CR10"},{"doi-asserted-by":"crossref","unstructured":"J. Fridrich, Steganography in Digital Media, Principles, Algorithms, and Applications (Cambridge University Press, Cambridge, 2010)","key":"7_CR11","DOI":"10.1017\/CBO9781139192903"},{"doi-asserted-by":"crossref","unstructured":"M. Gkizeli, D.A. Pados, S.N. Batalama, M.J. Medley, Blind iterative recovery of spread-spectrum steganographic messages, in Proc. IEEE Intern. Conf. Image Process. (ICIP), (Genova, Sept. 2005), vol. 2, pp. 11\u201314","key":"7_CR12","DOI":"10.1109\/ICIP.2005.1530251"},{"doi-asserted-by":"crossref","unstructured":"M. Gkizeli, D.A. Pados, M.J. Medley, SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography, in Proc. IEEE Intern. Conf. Image Process. (ICIP), (Singapore, Oct. 2004), vol. 2, pp. 1561\u20131564","key":"7_CR13","DOI":"10.1109\/ICIP.2004.1421364"},{"key":"7_CR14","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1109\/TIP.2006.888345","volume":"16","author":"M Gkizeli","year":"2007","unstructured":"M. Gkizeli, D.A. Pados, M.J. Medley, Optimal carrier design for spread-spectrum steganography. IEEE Trans. Image Process. 16, 391\u2013405 (2007)","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR15","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/TIFS.2010.2041826","volume":"5","author":"G Gul","year":"2010","unstructured":"G. Gul, F. Kurugollu, SVD-based universal spatial domain image steganalysis. IEEE Trans. Inf. Forens. Secur. 5, 349\u2013353 (2010)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"7_CR16","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/83.817598","volume":"9","author":"J Hernandez","year":"2000","unstructured":"J. Hernandez, M. Amado, F. Perez-Gonzalez, DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9, 55\u201368 (2000)","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR17","doi-asserted-by":"crossref","first-page":"1483","DOI":"10.1162\/neco.1997.9.7.1483","volume":"9","author":"A Hyv\u00e4rinen","year":"1997","unstructured":"A. Hyv\u00e4rinen, E. Oja, A fast fixed-point algorithm for independent component analysis. Neural Computation 9, 1483\u20131492 (1997)","journal-title":"Neural Computation"},{"key":"7_CR18","first-page":"43","volume-title":"Information Hiding","author":"NF Johnson","year":"2000","unstructured":"N.F. Johnson, S. Katzenbeisser, A survey of steganographic techniques, in Information Hiding, ed. by S. Katzenbeisser, F. Peticolas (Artech House, Norwood, 2000), pp. 43\u201378"},{"doi-asserted-by":"crossref","unstructured":"M. Li, S. N. Batalama, and D. A. Pados, Population size identification for CDMA eavesdropping, in Proc. IEEE Military Commun. Conf. (MILCOM), (Orlando, FL, Oct. 2007), pp. 1\u20136","key":"7_CR19","DOI":"10.1109\/MILCOM.2007.4454983"},{"doi-asserted-by":"crossref","unstructured":"M. Li, S. N. Batalama, D. A. Pados, and J. D. Matyjas, Multiuser CDMA signal extraction, in Proc. IEEE Military Commun. Conf. (MILCOM), (Washington D.C., Oct. 2006), pp. 1\u20135","key":"7_CR20","DOI":"10.1109\/MILCOM.2006.302230"},{"key":"7_CR21","doi-asserted-by":"crossref","first-page":"3146","DOI":"10.1109\/78.875471","volume":"48","author":"T Li","year":"2000","unstructured":"T. Li, N.D. Sidiropoulos, Blind digital signal separation using successive interference cancellation iterative least squares. IEEE Trans. Signal Process. 48, 3146\u20133152 (2000)","journal-title":"IEEE Trans. Signal Process."},{"issue":"7","key":"7_CR22","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1109\/TIFS.2013.2264462","volume":"8","author":"M Li","year":"2013","unstructured":"M. Li, M. Kulhandjian, D.A. Pados, S.N. Batalama, M.J. Medley, Extracting spread-spectrum hidden data from digital media. IEEE Trans. Inf. Forens. Secur 8(7), 1201\u20131210 (2013)","journal-title":"IEEE Trans. Inf. Forens. Secur"},{"key":"7_CR23","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1109\/TMM.2005.858377","volume":"7","author":"W Lie","year":"2005","unstructured":"W. Lie, G. Lin, A feature-based classification technique for blind image steganalysis. IEEE Trans. Multimed. 7, 1007\u20131020 (2005)","journal-title":"IEEE Trans. Multimed."},{"key":"7_CR24","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TIFS.2005.863485","volume":"1","author":"S Lyu","year":"2006","unstructured":"S. Lyu, H. Farid, Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forens. Secur. 1, 111\u2013119 (2006)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"7_CR25","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"HS Malvar","year":"2003","unstructured":"H.S. Malvar, D.A. Florencio, Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51, 898\u2013905 (2003)","journal-title":"IEEE Trans. Signal Process."},{"key":"7_CR26","volume-title":"Statistical and Adaptive Signal Processing: Spectral Estimation, Signal Modeling, Adaptive Filtering and Array Processing","author":"DG Manolakis","year":"2000","unstructured":"D.G. Manolakis, V.K. Ingle, S.M. Kogon, Statistical and Adaptive Signal Processing: Spectral Estimation, Signal Modeling, Adaptive Filtering and Array Processing (McGraw-Hill, Boston, 2000)"},{"key":"7_CR27","doi-asserted-by":"crossref","DOI":"10.1137\/1.9780898719512","volume-title":"Matrix Analysis and Applied Linear Algebra","author":"CD Meyer","year":"2000","unstructured":"C.D. Meyer, Matrix Analysis and Applied Linear Algebra (SIAM, Philadelphia, 2000)"},{"key":"7_CR28","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TIFS.2008.2009603","volume":"4","author":"L P\u00e9rez-Freire","year":"2009","unstructured":"L. P\u00e9rez-Freire, F. P\u00e9rez-Gonz\u00e1lez, Spread-spectrum watermarking security. IEEE Trans. Inf. Forens. Secur. 4, 2\u201324 (2009)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"7_CR29","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"T. Pevny, P. Bas, J. Fridrich, Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forens. Secur. 5, 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"7_CR30","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/6046.944472","volume":"3","author":"C Qiang","year":"2001","unstructured":"C. Qiang, T.S. Huang, An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans. Multimed. 3, 273\u2013284 (2001)","journal-title":"IEEE Trans. Multimed."},{"unstructured":"G. J. Simmons, The prisoner\u2019s problem and the subliminal channel, in Advances in Cryptology: Proc. CRYPTO\u201983, (New York: Plenum, 1984), pp. 51\u201367","key":"7_CR31"},{"doi-asserted-by":"crossref","unstructured":"S. Talwar, A. Paulraj, Blind separation of synchronous co-channel digital signals using an antenna array\u2014part II: performance analysis. IEEE Trans. Signal Process. 45, 706\u2013718 (1997)","key":"7_CR32","DOI":"10.1109\/78.558489"},{"doi-asserted-by":"crossref","unstructured":"S. Talwar, M. Viberg, A. Paulraj, Blind separation of synchronous co-channel digital signals using an antenna array\u2014part I: algorithms. IEEE Trans. Signal Process. 44, 1184\u20131197 (1996)","key":"7_CR33","DOI":"10.1109\/78.502331"},{"unstructured":"The federal plan for cyber security and information assurance research and development, reported by the interagency working group on cyber security and information assurance, (Apr. 2006)","key":"7_CR34"},{"key":"7_CR35","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TSP.2004.839925","volume":"53","author":"S Trivedi","year":"2005","unstructured":"S. Trivedi, R. Chandramouli, Secret key estimation in sequential steganography. IEEE Trans. Signal Process. 53, 746\u2013757 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"7_CR36","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/TIFS.2010.2103061","volume":"6","author":"A Valizadeh","year":"2011","unstructured":"A. Valizadeh, Z.J. Wang, Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans. Inf. Forens. Secur. 6, 267\u2013282 (2011)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"doi-asserted-by":"crossref","unstructured":"Y. Wang, P. Moulin, Steganalysis of block-DCT image steganography, in Proc. IEEE Workshop on Statistical Signal Process., (Saint-Louis, MO, Sept, 2003), pp. 339\u2013342","key":"7_CR37","DOI":"10.1109\/SSP.2003.1289414"},{"key":"7_CR38","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"S Wang","year":"2004","unstructured":"S. Wang, H. Wang, Cyber warfare: steganography vs. steganalysis. Commun. ACM 47, 76\u201382 (2004)","journal-title":"Commun. ACM"},{"key":"7_CR39","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TIFS.2006.890517","volume":"2","author":"Y Wang","year":"2007","unstructured":"Y. Wang, P. Moulin, Optimized feature extraction for learning-based image steganalysis. IEEE Trans. Inf. Forens. Secur. 2, 31\u201345 (2007)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"doi-asserted-by":"crossref","unstructured":"M. Wax, Detection and localization of multiple sources via the stochastic signals model. IEEE Trans. Signal Process. 39, 2450\u20132456 (1991)","key":"7_CR40","DOI":"10.1109\/78.98000"},{"key":"7_CR41","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/TASSP.1985.1164557","volume":"33","author":"M Wax","year":"1985","unstructured":"M. Wax, T. Kailath, Detection of signals by information theroretic criteria. IEEE Trans. Acoust. Speech Signal Process. 33, 387\u2013392 (1985)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"7_CR42","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.1109\/78.934146","volume":"49","author":"Y Yao","year":"2001","unstructured":"Y. Yao, H.V. Poor, Eavesdropping in the synchronous CDMA channel: an EM-based approach. IEEE Trans. Signal Process. 49, 1748\u20131756 (2001)","journal-title":"IEEE Trans. Signal Process."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-015-0007-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-015-0007-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-015-0007-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T00:26:43Z","timestamp":1747700803000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-015-0007-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,26]]},"references-count":42,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["7"],"URL":"https:\/\/doi.org\/10.1007\/s00034-015-0007-7","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2015,2,26]]}}}