{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T13:21:50Z","timestamp":1771680110910,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001849","name":"defence research and development organisation","doi-asserted-by":"publisher","award":["ERIP\/ER\/201702007\/M\/01\/1733"],"award-info":[{"award-number":["ERIP\/ER\/201702007\/M\/01\/1733"]}],"id":[{"id":"10.13039\/501100001849","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10044-022-01102-2","type":"journal-article","created":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T18:21:53Z","timestamp":1662747713000},"page":"239-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Novel color image steganalysis method based on RGB channel empirical modes to expose stego images with diverse payloads"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2763-958X","authenticated-orcid":false,"given":"E.","family":"Amrutha","sequence":"first","affiliation":[]},{"given":"S.","family":"Arivazhagan","sequence":"additional","affiliation":[]},{"given":"W. Sylvia Lilly","family":"Jebarani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,9]]},"reference":[{"key":"1102_CR1","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2010","unstructured":"Fridrich J (2010) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge"},{"key":"1102_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2566590.2566610","volume":"57","author":"E Zieli\u0144ska","year":"2014","unstructured":"Zieli\u0144ska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 57:86\u201395. https:\/\/doi.org\/10.1145\/2566590.2566610","journal-title":"Commun ACM"},{"key":"1102_CR3","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-49380-8_19","volume-title":"Information hiding","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Steganalysis of images created using current steganography software. In: Aucsmith D (ed) Information hiding. Springer, Berlin, pp 273\u2013289"},{"key":"1102_CR4","first-page":"4634","volume":"2","author":"R Doshi","year":"2012","unstructured":"Doshi R, Jain P, Gupta L (2012) Steganography and its applications in security. Int J Mod Eng Res 2:4634\u20134638","journal-title":"Int J Mod Eng Res"},{"key":"1102_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security new challenges\u2014MM&Sec \u201901. ACM Press, Ottawa, Ontario, Canada, p 27","DOI":"10.1145\/1232454.1232466"},{"key":"1102_CR6","doi-asserted-by":"publisher","unstructured":"Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. In: Proceedings of security, steganography, and watermarking of multimedia contents VI, California, pp 35-45. https:\/\/doi.org\/10.1117\/12.526012","DOI":"10.1117\/12.526012"},{"key":"1102_CR7","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE TransInformForensic Secur 7:868\u2013882. https:\/\/doi.org\/10.1109\/TIFS.2012.2190402","journal-title":"IEEE TransInformForensic Secur"},{"key":"1102_CR8","doi-asserted-by":"crossref","unstructured":"Goljan M, Fridrich J, Cogranne R (2014) Rich model for Steganalysis of color images. In: 2014 IEEE International workshop on information forensics and security (WIFS). IEEE, Atlanta, GA, USA, pp 185\u2013190","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"1102_CR9","doi-asserted-by":"crossref","unstructured":"Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2015) Color Image stegananalysis using correlations between RGB channels. In: 2015 10th International conference on availability, reliability and security. IEEE, Toulouse, pp 448\u2013454","DOI":"10.1109\/ARES.2015.44"},{"key":"1102_CR10","doi-asserted-by":"crossref","unstructured":"Goljan M, Fridrich J (2015) CFA-aware features for steganalysis of color images. In: Alattar AM, Memon ND, Heitzenrater CD (eds) San Francisco, California, United States, p 94090V","DOI":"10.1117\/12.2078399"},{"key":"1102_CR11","doi-asserted-by":"crossref","unstructured":"Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2016) Color image steganalysis based on steerable Gaussian filters bank. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security\u2014IH&MMSec \u201916. ACM Press, Vigo, Galicia, Spain, pp 109\u2013114","DOI":"10.1145\/2909827.2930799"},{"key":"1102_CR12","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1002\/sec.1427","volume":"9","author":"H Abdulrahman","year":"2016","unstructured":"Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2016) Color images steganalysis using rgb channel geometric transformation measures: a demonstration of the class file. Security Comm Networks 9:2945\u20132956. https:\/\/doi.org\/10.1002\/sec.1427","journal-title":"Security Comm Networks"},{"key":"1102_CR13","doi-asserted-by":"publisher","unstructured":"Arivazhagan S, Sylvia Lilly Jebarani W, Veena ST, Shanmugaraj M (2015) A novel low-D feature based generic steganalyzer to detect low volume payloads. Indian J Sci Technol 8. https:\/\/doi.org\/10.17485\/ijst\/2015\/v8i24\/79991","DOI":"10.17485\/ijst\/2015\/v8i24\/79991"},{"key":"1102_CR14","doi-asserted-by":"crossref","unstructured":"Arivazhagan S, Jebarani WSL, Veena ST (2016) Enormity of low volume blind steganalysis in clean and uncompressed image formats. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, Nagercoil, India, pp 1\u20137","DOI":"10.1109\/ICCPCT.2016.7530230"},{"key":"1102_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jisa.2016.04.001","volume":"30","author":"H Sajedi","year":"2016","unstructured":"Sajedi H (2016) Steganalysis based on steganography pattern discovery. J Inform Security Appl 30:3\u201314. https:\/\/doi.org\/10.1016\/j.jisa.2016.04.001","journal-title":"J Inform Security Appl"},{"key":"1102_CR16","doi-asserted-by":"publisher","first-page":"155014771985203","DOI":"10.1177\/1550147719852031","volume":"15","author":"Y Kang","year":"2019","unstructured":"Kang Y, Liu F, Yang C et al (2019) Color image steganalysis based on channel gradient correlation. Int J Distrib Sens Netw 15:155014771985203. https:\/\/doi.org\/10.1177\/1550147719852031","journal-title":"Int J Distrib Sens Netw"},{"key":"1102_CR17","doi-asserted-by":"publisher","unstructured":"Kang Y, Liu F, Yang C, et al. (2019) Color image steganalysis based on residuals of channel differences. Comput Mater Continua 59:315\u2013329. https:\/\/doi.org\/10.32604\/cmc.2019.05242","DOI":"10.32604\/cmc.2019.05242"},{"key":"1102_CR18","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu H-Z, Shi Y-Q (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23:708\u2013712. https:\/\/doi.org\/10.1109\/LSP.2016.2548421","journal-title":"IEEE Signal Process Lett"},{"key":"1102_CR19","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE TransInformForensic Secur 12:2545\u20132557. https:\/\/doi.org\/10.1109\/TIFS.2017.2710946","journal-title":"IEEE TransInformForensic Secur"},{"key":"1102_CR20","doi-asserted-by":"publisher","first-page":"19633","DOI":"10.1007\/s11042-017-5326-1","volume":"77","author":"Y Qian","year":"2018","unstructured":"Qian Y, Dong J, Wang W, Tan T (2018) Feature learning for steganalysis using convolutional neural networks. Multimed Tools Appl 77:19633\u201319657. https:\/\/doi.org\/10.1007\/s11042-017-5326-1","journal-title":"Multimed Tools Appl"},{"key":"1102_CR21","doi-asserted-by":"publisher","first-page":"10437","DOI":"10.1007\/s11042-017-4440-4","volume":"77","author":"S Wu","year":"2018","unstructured":"Wu S, Zhong S, Liu Y (2018) Deep residual learning for image steganalysis. Multimed Tools Appl 77:10437\u201310453. https:\/\/doi.org\/10.1007\/s11042-017-4440-4","journal-title":"Multimed Tools Appl"},{"key":"1102_CR22","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE TransInformForensic Secur 14:1181\u20131193. https:\/\/doi.org\/10.1109\/TIFS.2018.2871749","journal-title":"IEEE TransInformForensic Secur"},{"key":"1102_CR23","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1109\/TIFS.2019.2904413","volume":"14","author":"J Zeng","year":"2019","unstructured":"Zeng J, Tan S, Liu G et al (2019) WISERNet: wider separate-then-reunion network for steganalysis of color images. IEEE TransInformForensic Secur 14:2735\u20132748. https:\/\/doi.org\/10.1109\/TIFS.2019.2904413","journal-title":"IEEE TransInformForensic Secur"},{"key":"1102_CR24","doi-asserted-by":"publisher","first-page":"155014772091782","DOI":"10.1177\/1550147720917826","volume":"16","author":"C Yang","year":"2020","unstructured":"Yang C, Kang Y, Liu F et al (2020) Color image steganalysis based on embedding change probabilities in differential channels. Int J Distrib Sens Netw 16:155014772091782. https:\/\/doi.org\/10.1177\/1550147720917826","journal-title":"Int J Distrib Sens Netw"},{"key":"1102_CR25","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1098\/rspa.1998.0193","volume":"454","author":"NE Huang","year":"1998","unstructured":"Huang NE, Shen Z, Long SR et al (1998) The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proc R Soc Lond A 454:903\u2013995. https:\/\/doi.org\/10.1098\/rspa.1998.0193","journal-title":"Proc R Soc Lond A"},{"key":"1102_CR26","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE TransInformForensic Secur 7:432\u2013444. https:\/\/doi.org\/10.1109\/TIFS.2011.2175919","journal-title":"IEEE TransInformForensic Secur"},{"key":"1102_CR27","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1068\/p5321","volume":"33","author":"A Olmos","year":"2004","unstructured":"Olmos A, Kingdom FAA (2004) A biologically inspired algorithm for the recovery of shading and reflectance images. Perception 33:1463\u20131473. https:\/\/doi.org\/10.1068\/p5321","journal-title":"Perception"},{"key":"1102_CR28","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec \u201913. ACM Press, Montpellier, France, p 59","DOI":"10.1145\/2482513.2482514"},{"key":"1102_CR29","doi-asserted-by":"crossref","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP). IEEE, Paris, France, pp 4206\u20134210","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"1102_CR30","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE TransInformForensic Secur 11:221\u2013234. https:\/\/doi.org\/10.1109\/TIFS.2015.2486744","journal-title":"IEEE TransInformForensic Secur"},{"key":"1102_CR31","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","volume":"5","author":"T Filler","year":"2010","unstructured":"Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE TransInformForensic Secur 5:705\u2013720. https:\/\/doi.org\/10.1109\/TIFS.2010.2077629","journal-title":"IEEE TransInformForensic Secur"},{"key":"1102_CR32","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Costa Adeje\u2014Tenerife, Spain, pp 234\u2013239","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"1102_CR33","doi-asserted-by":"crossref","unstructured":"Ker AD, Pevn\u00fd T, Kodovsk\u00fd J, Fridrich J (2008) The square root law of steganographic capacity. In: Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec \u201908. ACM Press, Oxford, p 107","DOI":"10.1145\/1411328.1411349"},{"key":"1102_CR34","doi-asserted-by":"publisher","first-page":"11465","DOI":"10.1007\/s00521-021-05837-7","volume":"33","author":"S Arivazhagan","year":"2021","unstructured":"Arivazhagan S, Amrutha E, Sylvia Lilly Jebarani W, Veena ST (2021) Hybrid convolutional neural network architecture driven by residual features for steganalysis of spatial steganographic algorithms. Neural Comput & Applic 33:11465\u201311485. https:\/\/doi.org\/10.1007\/s00521-021-05837-7","journal-title":"Neural Comput & Applic"},{"key":"1102_CR35","doi-asserted-by":"crossref","unstructured":"Arivazhagan S, Jebarani WSL, Veena ST (2016) Low volume generic steganalysis with improved generalization. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, Nagercoil, India, pp 1\u20136","DOI":"10.1109\/ICCPCT.2016.7530334"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-022-01102-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-022-01102-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-022-01102-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T03:21:55Z","timestamp":1675480915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-022-01102-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,9]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["1102"],"URL":"https:\/\/doi.org\/10.1007\/s10044-022-01102-2","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,9]]},"assertion":[{"value":"6 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}