{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:45:59Z","timestamp":1753357559387},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2009,8,15]],"date-time":"2009-08-15T00:00:00Z","timestamp":1250294400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s10207-009-0089-y","type":"journal-article","created":{"date-parts":[[2009,8,14]],"date-time":"2009-08-14T07:32:42Z","timestamp":1250235162000},"page":"433-445","source":"Crossref","is-referenced-by-count":19,"title":["Secure steganography based on embedding capacity"],"prefix":"10.1007","volume":"8","author":[{"given":"Hedieh","family":"Sajedi","sequence":"first","affiliation":[]},{"given":"Mansour","family":"Jamzad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,15]]},"reference":[{"key":"89_CR1","doi-asserted-by":"crossref","unstructured":"Marvel, L.M.: Spread spectrum image steganography. IEEE Trans. Image Process. pp. 1075\u20131083 (1999)","DOI":"10.1109\/83.777088"},{"key":"89_CR2","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5-a steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of 4th International Workshop on Information Hiding (2001)","DOI":"10.1007\/3-540-45496-9_21"},{"key":"89_CR3","doi-asserted-by":"crossref","unstructured":"Sallee, P.: Model-based steganography. In: Proceedings of Intetrnational Workshop on Digital Watermarking, Seoul, Korea (2003)","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"89_CR4","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proceedings of ACM, Multimedia Workshop, Germany (2004)","DOI":"10.1145\/1022431.1022435"},{"key":"89_CR5","doi-asserted-by":"crossref","unstructured":"Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: yet another steganographic scheme that resists blind steganalysis. In: Proceedings of 9th International Workshop on Information Hiding, June (2007)","DOI":"10.1007\/978-3-540-77370-2_2"},{"key":"89_CR6","doi-asserted-by":"crossref","unstructured":"Sajedi, H., Jamzad, M.: Adaptive Steganography Method Based on Contourlet Transform. In: Proceedings of 9th International Conference on Signal Processing, pp. 745\u2013748 (2008)","DOI":"10.1109\/ICOSP.2008.4697237"},{"key":"89_CR7","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1117\/12.479732","volume":"5020","author":"R. Chandramouli","year":"2003","unstructured":"Chandramouli R., Memon N.D.: Steganography capacity: a steganalysis perspective. Proc. SPIE Secur. Watermarking Multimed. Contents 5020, 173\u2013177 (2003)","journal-title":"Proc. SPIE Secur. Watermarking Multimed. Contents"},{"key":"89_CR8","volume-title":"Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities. MM&Sec","author":"J. Fridrich","year":"2007","unstructured":"Fridrich J., Pevny T., Kodovsky J.: Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities. MM&Sec. ACM, Dallas (2007)"},{"key":"89_CR9","doi-asserted-by":"crossref","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Proceedings of 2nd International Workshop on Information Hiding. LNCS, vol. 1525, pp. 306\u2013318 (1998)","DOI":"10.1007\/3-540-49380-8_21"},{"key":"89_CR10","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1109\/TIP.2002.802512","volume":"11","author":"P. Moulin","year":"2002","unstructured":"Moulin P., Mihcak M.K.: A framework for evaluating the data hiding capacity of image sources. IEEE Trans. Image Process. 11, 1029\u20131042 (2002)","journal-title":"IEEE Trans. Image Process."},{"key":"89_CR11","doi-asserted-by":"crossref","unstructured":"Dong, Y., Han, K.: Boosting SVM classifiers by ensemble. In: Proceedings of 14th International Conference of ACM on World Wide Web, pp. 1072\u20131073 (2005)","DOI":"10.1145\/1062745.1062874"},{"key":"89_CR12","first-page":"265","volume":"4437","author":"A.D. Ker","year":"2006","unstructured":"Ker A.D.: A Batch steganography and pooled steganalysis. Proc. Inf. Hiding Workshop 4437, 265\u2013281 (2006)","journal-title":"Proc. Inf. Hiding Workshop"},{"issue":"8","key":"89_CR13","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/LSP.2006.891319","volume":"14","author":"A.D. Ker","year":"2007","unstructured":"Ker A.D.: A capacity result for batch steganography. IEEE Signal Process. Let. 14(8), 525\u2013528 (2007)","journal-title":"IEEE Signal Process. Let."},{"key":"89_CR14","unstructured":"Martin, A., Sapiro, G., Seroussi, G.: Is Image Steganography Natural? Technical Report, Information Theory Research Group, HP Laboratories Palo Alto (2004)"},{"key":"89_CR15","doi-asserted-by":"crossref","DOI":"10.1117\/12.587375","volume-title":"Benchmarking steganographic and steganalysis, techniques","author":"M. Kharrazi","year":"2005","unstructured":"Kharrazi M., Sencar T.H., Memon N.: Benchmarking steganographic and steganalysis, techniques. EI SPIE, San Jose (2005)"},{"key":"89_CR16","doi-asserted-by":"crossref","unstructured":"Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image steganalysis with binary similarity measures. EURASIP J. Appl. Signal Process. (2005)","DOI":"10.1155\/ASP.2005.2749"},{"key":"89_CR17","doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Proceedings of 5th International Workshop on Information Hiding (2002)","DOI":"10.1007\/3-540-36415-3_22"},{"key":"89_CR18","volume-title":"Steganalysis using color wavelet statistics and one-class support vector machines","author":"S. Lyu","year":"2004","unstructured":"Lyu S., Farid H.: Steganalysis using color wavelet statistics and one-class support vector machines. SPIE Symposium on Electronic Imaging, San Jose, CA (2004)"},{"key":"89_CR19","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Proceedings of 6th International Workshop on Information Hiding, Toronto (2004)","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"89_CR20","doi-asserted-by":"crossref","unstructured":"Dietterich, T.G.: Ensemble methods in machine learning. Multiple Classifier Systems. LNCS, vol. 1857, pp. 1\u201315. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45014-9_1"},{"issue":"5","key":"89_CR21","first-page":"771","volume":"14","author":"Y. Freund","year":"1999","unstructured":"Freund Y., Schapire R.: A short introduction to boosting. J. Jpn. Soc. Artif. Intell. 14(5), 771\u2013780 (1999)","journal-title":"J. Jpn. Soc. Artif. Intell."},{"issue":"3","key":"89_CR22","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s11063-004-1640-5","volume":"20","author":"T. Qing","year":"2004","unstructured":"Qing T., Jue W.: A new fuzzy support vector machine based on the weighted margin. Neural Process. Lett. 20(3), 139\u2013150 (2004)","journal-title":"Neural Process. Lett."},{"key":"89_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, L., Lin, F., Zhang, B.: Support vector machine learning for image retrieval. In: Proceedings of IEEE International Conference on Image Processing, pp. 721\u2013724 (2001)","DOI":"10.1109\/ICIP.2001.958595"},{"key":"89_CR24","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C.J.C. Burges","year":"1998","unstructured":"Burges C.J.C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2, 121\u2013167 (1998)","journal-title":"Data Min. Knowl. Discov."},{"key":"89_CR25","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/S0925-2312(03)00431-4","volume":"55","author":"D. Meyer","year":"2003","unstructured":"Meyer D., Leisch F., Hornik K.: The support vector machine under test. Neurocomputing 55, 169\u2013186 (2003)","journal-title":"Neurocomputing"},{"key":"89_CR26","doi-asserted-by":"crossref","unstructured":"Pevny T., Fridrich J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, San Jose, CA (2007)","DOI":"10.1117\/12.696774"},{"key":"89_CR27","doi-asserted-by":"crossref","unstructured":"Sarkar, A., Solanki, K., Manjunath, B.S.: Further study on YASS: steganography based on randomized embedding to resist blind steganalysis. In: Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents (2008)","DOI":"10.1117\/12.767893"},{"key":"89_CR28","doi-asserted-by":"crossref","unstructured":"Chen, C., Shi, Y.Q., Chen, W., Xuan, G.: Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function. In: Proceedings of ICIP, Atlanta, GA, USA, pp. 105\u2013108 (2006)","DOI":"10.1109\/ICIP.2006.312383"},{"key":"89_CR29","doi-asserted-by":"crossref","unstructured":"Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Yang, C., Zhang, Z., Chai, P., Chen, C., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Proceedings of 7th International Workshop on Information Hiding (2005)","DOI":"10.1007\/11558859_20"},{"key":"89_CR30","doi-asserted-by":"crossref","unstructured":"Kermani, Z.Z., Jamzad, M.: A robust steganography algorithm based on texture similarity using gabor filter. In: Proceedings of IEEE Intrnational Symposium on Signal processing and Information Technology, pp. 578\u2013582 (2005)","DOI":"10.1109\/ISSPIT.2005.1577161"},{"key":"89_CR31","unstructured":"Sajedi, H., Jamzad, M.: Cover selection steganography method based on similarity of image blocks. In: Proceedings of IEEE 8th CIT Conference, Sydney, Australia (2008)"},{"key":"89_CR32","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H., Memon, N.: Cover Selection for steganograpic embedding. In: Proceedings of ICIP, pp. 117\u2013121 (2006)","DOI":"10.1109\/ICIP.2006.312386"},{"key":"89_CR33","doi-asserted-by":"crossref","unstructured":"Watson, B.A.: DCT quantization matrices visually optimized for individual images, human vision. In: Visual Processing and Digital Display IV, Proceedings of SPIE, vol. 1913, pp. 202\u2013216 (2005)","DOI":"10.1117\/12.152694"},{"issue":"4","key":"89_CR34","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Wang Z., Bovik A., Sheikh H., Simoncelli E.: Perceptual image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"89_CR35","unstructured":"http:\/\/www.cs.washington.edu\/research\/imagedatabase"},{"key":"89_CR36","unstructured":"Chang, C.-C., Lin, C.-J.: Libsvm: a library for support vector machine. 2007. Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"issue":"5","key":"89_CR37","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1016\/S0031-3203(00)00034-0","volume":"34","author":"K. Cho","year":"2001","unstructured":"Cho K., Jang J., Hong K.: Adaptive skin-color filter. Pattern Recognit. 34(5), 1067\u20131073 (2001)","journal-title":"Pattern Recognit."},{"issue":"4","key":"89_CR38","first-page":"404","volume":"13","author":"M. Jamzad","year":"2006","unstructured":"Jamzad M., Yaghmaee F.: Achieving higher stability in watermarking according to image complexity. Sci. Iran. J. 13(4), 404\u2013412 (2006)","journal-title":"Sci. Iran. J."},{"key":"89_CR39","unstructured":"Haller, R.S.: Complexity of Real Images Evaluated by Densitometric Analysis and by Psychophysical Scaling. M.Sc. Thesis, University of Arizona (1970)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0089-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0089-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0089-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:24Z","timestamp":1559113284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0089-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,15]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["89"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0089-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8,15]]}}}