{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:09:51Z","timestamp":1770138591249,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T00:00:00Z","timestamp":1641340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T00:00:00Z","timestamp":1641340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10489-021-02923-0","type":"journal-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T15:02:51Z","timestamp":1641394971000},"page":"9388-9405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Feature selection method for color image steganalysis based on fuzzy neighborhood conditional entropy"],"prefix":"10.1007","volume":"52","author":[{"given":"Jiucheng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8677-516X","authenticated-orcid":false,"given":"Yuanyuan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Kanglin","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Yuhan","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,5]]},"reference":[{"issue":"3","key":"2923_CR1","doi-asserted-by":"publisher","first-page":"3709","DOI":"10.3233\/JIFS-182836","volume":"37","author":"Y Chen","year":"2019","unstructured":"Chen Y, Chen Y, Yin A (2019) Feature selection for blind image steganalysis using neighborhood rough sets. J Intell Fuzzy Syst 37(3):3709\u20133720. https:\/\/doi.org\/10.3233\/JIFS-182836","journal-title":"J Intell Fuzzy Syst"},{"issue":"4","key":"2923_CR2","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","volume":"5","author":"T Filler","year":"2010","unstructured":"Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensic Secur 5(4):705\u2013720. https:\/\/doi.org\/10.1109\/TIFS.2010.2077629","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"1","key":"2923_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. Eurasip J Inf Secur 2014(1):1. https:\/\/doi.org\/10.1186\/1687-417X-2014-1","journal-title":"Eurasip J Inf Secur"},{"key":"2923_CR4","doi-asserted-by":"publisher","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: IEEE workshop on information forensic and security. https:\/\/doi.org\/10.1109\/WIFS.2012.6412655","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"2923_CR5","doi-asserted-by":"publisher","unstructured":"Wang Y, Ma Y, Jin R, Liu P, Ning R (2020) Comprehensive criteria-based generalized steganalysis feature selection method. IEEE Access PP(99):1\u20131. https:\/\/doi.org\/10.1109\/ACCESS.2020.3018709","DOI":"10.1109\/ACCESS.2020.3018709"},{"key":"2923_CR6","doi-asserted-by":"publisher","unstructured":"Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive jpeg steganography using 2d gabor filters. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp 15\u201323. https:\/\/doi.org\/10.1145\/2756601.2756608","DOI":"10.1145\/2756601.2756608"},{"key":"2923_CR7","doi-asserted-by":"publisher","unstructured":"Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 48\u201353. https:\/\/doi.org\/10.1109\/WIFS.2014.7084302","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"8","key":"2923_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-080","volume":"2016","author":"T Denemark","year":"2016","unstructured":"Denemark T, Fridrich J, Comesa\u00f1a-Alfaro P (2016) Improving selection-channel-aware steganalysis features. Electr Imaging 2016(8):1\u20138. https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2016.8.MWSF-080","journal-title":"Electr Imaging"},{"issue":"7","key":"2923_CR9","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/LSP.2016.2575100","volume":"23","author":"J Yu","year":"2016","unstructured":"Yu J, Li F, Cheng H, Zhang X (2016) Spatial steganalysis using contrast of residuals. IEEE Signal Process Lett 23(7):989\u2013992. https:\/\/doi.org\/10.1109\/LSP.2016.2575100","journal-title":"IEEE Signal Process Lett"},{"issue":"1","key":"2923_CR10","doi-asserted-by":"publisher","first-page":"315","DOI":"10.32604\/cmc.2019.05242","volume":"59","author":"Y Kang","year":"2019","unstructured":"Kang Y, Liu F, Yang C, Luo X, Zhang T (2019) Color image steganalysis based on residuals of channel differences. Comput Mater Continua 59(1):315\u2013329. https:\/\/doi.org\/10.32604\/cmc.2019.05242","journal-title":"Comput Mater Continua"},{"key":"2923_CR11","doi-asserted-by":"publisher","unstructured":"Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. In: Security, steganography, and watermarking of multimedia contents VI. https:\/\/doi.org\/10.1117\/12.526012","DOI":"10.1117\/12.526012"},{"key":"2923_CR12","doi-asserted-by":"publisher","unstructured":"Goljan M, Fridrich J, Cogranne R (2015) Rich model for steganalysis of color images. In: 2014 IEEE international workshop on information forensics and security (WIFS). https:\/\/doi.org\/10.1109\/WIFS.2014.7084325","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"2923_CR13","doi-asserted-by":"publisher","unstructured":"Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2015) Color image stegananalysis using correlations between rgb channels. In: 2015 10th international conference on availability, reliability and security. IEEE, pp 448\u2013454. https:\/\/doi.org\/10.1109\/ARES.2015.44","DOI":"10.1109\/ARES.2015.44"},{"key":"2923_CR14","doi-asserted-by":"publisher","unstructured":"Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2016a) Color image steganalysis based on steerable gaussian filters bank. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security, pp 109\u2013114. https:\/\/doi.org\/10.1145\/2909827.2930799","DOI":"10.1145\/2909827.2930799"},{"issue":"15","key":"2923_CR15","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1002\/sec.1427","volume":"9","author":"H Abdulrahman","year":"2016","unstructured":"Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2016b) Color images steganalysis using rgb channel geometric transformation measures. Secur Commun Netw 9 (15):2945\u20132956. https:\/\/doi.org\/10.1002\/sec.1427","journal-title":"Secur Commun Netw"},{"issue":"4","key":"2923_CR16","doi-asserted-by":"publisher","first-page":"724","DOI":"10.11897\/SP.J.1016.2021.00724","volume":"44","author":"Y Ma","year":"2021","unstructured":"Ma Y, Xu J, Yang C, Luo X (2021) Rich model steganalysis feature selection method based on w2id criterion. Chin J Comput 44(4):724\u2013740. https:\/\/doi.org\/10.11897\/SP.J.1016.2021.00724","journal-title":"Chin J Comput"},{"key":"2923_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2020.05.010","volume":"535","author":"C Yan","year":"2020","unstructured":"Yan C, Kla B, Jsa B, Hfcd E, Xya B, Yq F (2020) Attribute group for attribute reduction - sciencedirect. Inf Sci 535:64\u201380. https:\/\/doi.org\/10.1016\/j.ins.2020.05.010","journal-title":"Inf Sci"},{"key":"2923_CR18","doi-asserted-by":"publisher","unstructured":"Liu K, Yang X, Yu H, Fujita H, Liu D (2020) Supervised information granulation strategy for attribute reduction. Int J Mach Learn Cybern 11(5150). https:\/\/doi.org\/10.1007\/s13042-020-01107-5","DOI":"10.1007\/s13042-020-01107-5"},{"key":"2923_CR19","doi-asserted-by":"publisher","unstructured":"Yang X, Li T, Liu D, Fujita H (2020) A multilevel neighborhood sequential decision approach of three-way granular computing. Inf Sci:538. https:\/\/doi.org\/10.1016\/j.ins.2020.05.060","DOI":"10.1016\/j.ins.2020.05.060"},{"key":"2923_CR20","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.ins.2016.09.012","volume":"373","author":"H Chen","year":"2016","unstructured":"Chen H, Li T, Cai Y, Luo C, Fujita H (2016) Parallel attribute reduction in dominance-based neighborhood rough set. Inf Sci 373:351\u2013368. https:\/\/doi.org\/10.1016\/j.ins.2016.09.012","journal-title":"Inf Sci"},{"key":"2923_CR21","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.engappai.2013.09.016","volume":"31","author":"FG Mohammadi","year":"2014","unstructured":"Mohammadi F G, Abadeh M S (2014) Image steganalysis using a bee colony based feature selection algorithm. Eng Appl Artif Intell 31:35\u201343. https:\/\/doi.org\/10.1016\/j.engappai.2013.09.016","journal-title":"Eng Appl Artif Intell"},{"issue":"6","key":"2923_CR22","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1007\/s13042-015-0448-0","volume":"7","author":"RR Chhikara","year":"2016","unstructured":"Chhikara R R, Sharma P, Singh L (2016) A hybrid feature selection approach based on improved pso and filter approaches for image steganalysis. Int J Mach Learn Cybern 7(6):1195\u20131206. https:\/\/doi.org\/10.1007\/s13042-015-0448-0","journal-title":"Int J Mach Learn Cybern"},{"issue":"1","key":"2923_CR23","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.diin.2013.12.001","volume":"11","author":"Jc Lu","year":"2014","unstructured":"Lu Jc, Liu Fl, Luo Xy (2014) Selection of image features for steganalysis based on the fisher criterion. Digit Invest 11(1):57\u201366. https:\/\/doi.org\/10.1016\/j.diin.2013.12.001","journal-title":"Digit Invest"},{"issue":"2","key":"2923_CR24","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/TCSVT.2018.2799243","volume":"29","author":"Y Ma","year":"2018","unstructured":"Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set \u03b1-positive region reduction. IEEE Trans Circ Syst Video Technol 29(2):336\u2013 350. https:\/\/doi.org\/10.1109\/TCSVT.2018.2799243","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"2923_CR25","doi-asserted-by":"publisher","unstructured":"Yang J, Liu Y, Feng C, Zhu G (2016) Applying the fisher score to identify alzheimer\u2019s disease-related genes. Genet Mol Res 15(2). https:\/\/doi.org\/10.4238\/gmr.15028798","DOI":"10.4238\/gmr.15028798"},{"issue":"1","key":"2923_CR26","doi-asserted-by":"publisher","first-page":"117","DOI":"10.3233\/JIFS-18100","volume":"36","author":"J Xu","year":"2019","unstructured":"Xu J, Wang Y, Mu H, Huang F (2019) Feature genes selection based on fuzzy neighborhood conditional entropy. J Intell Fuzzy Syst 36(1):117\u2013126. https:\/\/doi.org\/10.3233\/JIFS-18100","journal-title":"J Intell Fuzzy Syst"},{"issue":"5","key":"2923_CR27","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak Z (1982) Rough sets. Int J Comput Inf Sci 11(5):341\u2013356. https:\/\/doi.org\/10.1007\/BF01001956","journal-title":"Int J Comput Inf Sci"},{"issue":"18","key":"2923_CR28","doi-asserted-by":"publisher","first-page":"3577","DOI":"10.1016\/j.ins.2008.05.024","volume":"178","author":"Q Hu","year":"2008","unstructured":"Hu Q, Yu D, Liu J, Wu C (2008) Neighborhood rough set based heterogeneous feature subset selection. Inf Sci 178(18):3577\u20133594. https:\/\/doi.org\/10.1016\/j.ins.2008.05.024","journal-title":"Inf Sci"},{"key":"2923_CR29","doi-asserted-by":"publisher","unstructured":"Al-Sharhan S, Karray F, Gueaieb W, Basir O (2001) Fuzzy entropy: a brief survey. In: 10th IEEE international conference on fuzzy systems. (cat. no. 01CH37297), vol 3. IEEE, pp 1135\u20131139. https:\/\/doi.org\/10.1109\/FUZZ.2001.1008855","DOI":"10.1109\/FUZZ.2001.1008855"},{"key":"2923_CR30","doi-asserted-by":"publisher","unstructured":"Sun L, Zhang XY, Qian YH, Xu JC, Zhang SG, Tian Y (2019) Joint neighborhood entropy-based gene selection method with fisher score for tumor classification. Appl Intell 49(4):1245\u20131259. https:\/\/doi.org\/10.1007\/s10489-018-1320-1","DOI":"10.1007\/s10489-018-1320-1"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02923-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02923-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02923-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T09:29:47Z","timestamp":1653902987000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02923-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,5]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["2923"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02923-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,5]]},"assertion":[{"value":"15 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}