{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:46:08Z","timestamp":1762004768226,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T00:00:00Z","timestamp":1452729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61302178"],"award-info":[{"award-number":["61302178"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s00500-015-2011-z","type":"journal-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T05:48:32Z","timestamp":1452750512000},"page":"3335-3343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Fast projections of spatial rich model feature for digital image steganalysis"],"prefix":"10.1007","volume":"21","author":[{"given":"Pengfei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhihui","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,14]]},"reference":[{"key":"2011_CR1","doi-asserted-by":"crossref","unstructured":"Avcibas I, Memon ND, Sankur B (2001) Steganalysis using image quality metrics. In: Delp EJ, Wong PW (eds) SPIE, electronic imaging, security and watermarking of multimedia contents III, San Jose, vol 4341, pp 523\u2013531","DOI":"10.1117\/12.435436"},{"key":"2011_CR2","doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevn\u00fd T (2011) Break our steganographic system\u2014the ins and outs of organizing boss. In: Filler T, Pevn\u00fd T, Ker A, Craver S (eds) 13th international conference of information hiding. Lecture notes in computer science, Prague, vol 6958, pp 59\u201370","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"2011_CR3","doi-asserted-by":"crossref","unstructured":"Bingham E, Mannila H (2001) Random projection in dimensionality reduction: applications to image and text data. In: Knowledge discovery and data mining. ACM Press, New York. pp 245\u2013250","DOI":"10.1145\/502512.502546"},{"key":"2011_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14313-7","volume-title":"Advanced statistical steganalysis","author":"R B\u00f6hme","year":"2010","unstructured":"B\u00f6hme R (2010) Advanced statistical steganalysis. Springer, Berlin"},{"issue":"7","key":"2011_CR5","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1007\/s00500-014-1373-y","volume":"19","author":"M Botta","year":"2015","unstructured":"Botta M, Cavagnino D, Pomponiu V (2015) Fragile watermarking using Karhunen\u2013Lo\u00e9ve transform: the KLT-F approach. Soft Comput 19(7):1905\u20131919","journal-title":"Soft Comput"},{"key":"2011_CR6","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24:123\u2013140","journal-title":"Mach Learn"},{"key":"2011_CR7","doi-asserted-by":"publisher","unstructured":"Castiglione A, Bonaventura D, DeSantis A (2011a) Steganography and secure communication on online social networks and online photo sharing. In: 2011 international conference on broadband, wireless computing, communication and applications, pp 363\u2013368. doi: 10.1109\/BWCCA.2011.60","DOI":"10.1109\/BWCCA.2011.60"},{"key":"2011_CR8","doi-asserted-by":"publisher","unstructured":"Castiglione A, Bonaventura D, DeSantis A, Palmieri F (2011b) New steganographic techniques for the OOXML file format. In: IFIP international federation for information processing 2011 (ARES\u201911). LNCS 6908, vol 4. Springer, Berlin, pp 344\u2013358. doi: 10.1007\/978-3-642-23300-5_27","DOI":"10.1007\/978-3-642-23300-5_27"},{"key":"2011_CR9","doi-asserted-by":"publisher","unstructured":"Castiglione A, DeSantis A, Fiore U, Palmieri F (2011c) E-mail-based covert channels for asynchronous message steganography. In: International conference on innovative mobile and internet services in ubiquitous computing. IEEE, pp 503\u2013508. doi: 10.1109\/IMIS.2011.133","DOI":"10.1109\/IMIS.2011.133"},{"issue":"2","key":"2011_CR10","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.camwa.2011.07.068","volume":"63","author":"A Castiglione","year":"2012","unstructured":"Castiglione A, DeSantis A, Fiore U, Palmieri F (2012) An asynchronous covert channel using spam. Comput Math Appl 63(2):437\u2013447. doi: 10.1016\/j.camwa.2011.07.068","journal-title":"Comput Math Appl"},{"issue":"12","key":"2011_CR11","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"2011_CR12","volume-title":"Digital watermarking and steganography","author":"IJ Cox","year":"2008","unstructured":"Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publisher, San Francisco","edition":"2"},{"key":"2011_CR13","doi-asserted-by":"publisher","unstructured":"Denemark T, Fridrich J, Holub V (2014a) Further study on the security of s-uniward. In: Proceedings of SPIE\u2014the international society for optical engineering, vol 9028. doi: 10.1117\/12.2044803","DOI":"10.1117\/12.2044803"},{"key":"2011_CR14","doi-asserted-by":"crossref","unstructured":"Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014b) Selection-channel-aware rich model for steganalysis of digital images. In: Proc. of IEEE international workshop on information forensics and security, pp 48\u201353","DOI":"10.1109\/WIFS.2014.7084302"},{"key":"2011_CR15","doi-asserted-by":"crossref","unstructured":"Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensics Secur. 5(4):705\u2013720. http:\/\/www.ws.binghamton.edu\/fridrich\/Research\/gibbs-construction10.pdf . Accessed 22 Dec 2013","DOI":"10.1109\/TIFS.2010.2077629"},{"issue":"3","key":"2011_CR16","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrometrellis codes. IEEE Trans Inf Forensics Secur 6(3):920\u2013935","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2011_CR17","doi-asserted-by":"crossref","unstructured":"Fridrich J, Kodovsk\u00fd J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868\u2013882. http:\/\/dde.binghamton.edu\/kodovsky\/pdf\/TIFS2012-SRM.pdf . Accessed 22 Dec 2013","DOI":"10.1109\/TIFS.2012.2190402"},{"issue":"9","key":"2011_CR18","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1002\/sec.378","volume":"5","author":"Z Fu","year":"2012","unstructured":"Fu Z, Sun X, Liu Y, Liu B (2012) Text split-based steganography in OOXML format documents for covert communication. Secur Commun Netw 5(9):957\u2013968","journal-title":"Secur Commun Netw"},{"key":"2011_CR19","doi-asserted-by":"publisher","unstructured":"Goljan M, Fridrich J (2015) Cfa-aware features for steganalysis of color images. In: SPIE 9409, media watermarking, security, and forensics 2015 SPIE electronic imaging international society for optics and photonics, vol 94090V. doi: 10.1117\/12.2078399","DOI":"10.1117\/12.2078399"},{"key":"2011_CR20","doi-asserted-by":"crossref","unstructured":"Goljan M, Fridrich J, Cogranne R (2014) Rich model for steganalysis of color images. In: IEEE workshop on information forensic and security, Atlanta","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"2011_CR21","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Fourth IEEE international workshop on information forensics and security, Tenerife, pp 234\u2013239","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"2011_CR22","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/2482513.2482514","volume-title":"Proceedings of the first ACM workshop on information hiding and multimedia security","author":"V Holub","year":"2013","unstructured":"Holub V, Fridrich J (2013a) Digital image steganography using universal distortion. In: Puech W, Chaumont M, Dittmann J, Campisi P (eds) Proceedings of the first ACM workshop on information hiding and multimedia security. France, Montpellier, pp 59\u201368"},{"issue":"12","key":"2011_CR23","doi-asserted-by":"crossref","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub V, Fridrich J (2013b) Random projections of residuals for digital image steganalysis. IEEE Trans Inf Forensics Secur 8(12):1996\u20132006","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"2011_CR24","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Fridrich J (2015) Low complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219\u2013228","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"2011_CR25","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/TIFS.2012.2198213","volume":"7","author":"F Huang","year":"2012","unstructured":"Huang F, Huang J, Shi YQ (2012) New channel selection rule for jpeg steganography. IEEE Trans Inf Forensics Secur 7(4):1181\u20131191","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"2011_CR26","first-page":"96","volume":"9028","author":"AD Ker","year":"2014","unstructured":"Ker AD (2014) Implementing the projected spatial rich features on a GPU. Media Watermarking Secur Forensics 9028(2):96\u2013101","journal-title":"Media Watermarking Secur Forensics"},{"issue":"2","key":"2011_CR27","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2011_CR28","doi-asserted-by":"crossref","unstructured":"Lyu S, Farid H (2002) Detecting hidden messages using higher order statistics and support vector machines. In: 5th international workshop on information hiding. Lecture notes in computer science, vol 2578, pp 340\u2013354","DOI":"10.1007\/3-540-36415-3_22"},{"issue":"1","key":"2011_CR29","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TIFS.2005.863485","volume":"1","author":"S Lyu","year":"2006","unstructured":"Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inf Forensics Secur 1(1):111\u2013119. doi: 10.1109\/TIFS.2005.863485","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"2011_CR30","first-page":"1","volume":"18","author":"EG Mansoori","year":"2013","unstructured":"Mansoori EG (2013) GACH: a grid-based algorithm for hierarchical clustering of high-dimensional data. Soft Comput 18(5):1\u201318","journal-title":"Soft Comput"},{"key":"2011_CR31","unstructured":"Matsui K, Tanaka K (1994) Video-steganography: how to secretly embed a signature in a picture. In: IMA intellectual property project proceedings"},{"issue":"2","key":"2011_CR32","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2011_CR33","unstructured":"Rahimi A, Benjamin R (2008) Random features for large-scale kernel machines. In: Platt J, Koller D, Singer Y, Roweis S (eds) Advances in Neural Information Processing Systems 20, Curran Associates, Inc., pp 1177\u20131184. http:\/\/papers.nips.cc\/paper\/3182-random-features-for-large-scale-kernel-machines.pdf . Accessed 10 Feb 2015"},{"key":"2011_CR34","doi-asserted-by":"publisher","unstructured":"Wang P, Wei Z, Xiao L (2015) Pure spatial rich model features for digital image steganalysis. Multimed Tools Appl. doi: 10.1007\/s11042-015-2521-9","DOI":"10.1007\/s11042-015-2521-9"},{"key":"2011_CR35","first-page":"107","volume":"6","author":"M Zamani","year":"2012","unstructured":"Zamani M, Abdul MAB, Abdullah SM (2012) An overview on audio steganography techniques. Int J Digit Content Technol Appl 6:107\u2013122","journal-title":"Int J Digit Content Technol Appl"},{"issue":"6","key":"2011_CR36","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1016\/j.jpdc.2012.03.005","volume":"72","author":"X Zhu","year":"2012","unstructured":"Zhu X, He C, Li K, Qin X (2012) Adaptive energy-efficient scheduling for real-time tasks on DVS-enabled heterogeneous clusters. J Parallel Distrib Comput 72(6):751\u2013763","journal-title":"J Parallel Distrib Comput"},{"key":"2011_CR37","doi-asserted-by":"crossref","unstructured":"Zou D, Shi YQ, Su W, Xuan G (2006) Steganalysis based on markov model of thresholded prediction-error image. In: Proceedings IEEE, international conference on multimedia and expo, Toronto, pp 1365\u20131368","DOI":"10.1109\/ICME.2006.262792"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-2011-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-2011-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-2011-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-2011-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T13:15:30Z","timestamp":1567516530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-2011-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,14]]},"references-count":37,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["2011"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-2011-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2016,1,14]]}}}