{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:03:08Z","timestamp":1775260988300,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China under Grants","award":["U1536109"],"award-info":[{"award-number":["U1536109"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11036-018-1167-z","type":"journal-article","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:27:00Z","timestamp":1541032020000},"page":"1269-1278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Image Steganalysis via Random Subspace Fisher Linear Discriminant Vector Functional Link Network and Feature Mapping"],"prefix":"10.1007","volume":"24","author":[{"given":"Lingyan","family":"Fan","sequence":"first","affiliation":[]},{"given":"Wuyi","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Guorui","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,1]]},"reference":[{"issue":"11","key":"1167_CR1","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"},{"key":"1167_CR2","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: IEEE International workshop on information forensics and security, pp 234\u2013239","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"1167_CR3","first-page":"1","volume":"1","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 1:1\u201313","journal-title":"EURASIP J Inf Secur"},{"issue":"12","key":"1167_CR4","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","volume":"10","author":"L Guo","year":"2015","unstructured":"Guo L, Ni J, Su W, Tang C, Shi Y (2015) Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans Inf Forens Secur 10(12):2669\u20132680","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"1167_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","volume":"361\u2013362","author":"C Qin","year":"2016","unstructured":"Qin C, Chen X, Ye D, Wang J, Sun X (2016) A novel image hashing scheme with perceptual robustness using block truncation coding. Inf Sci 361\u2013362:84\u201399","journal-title":"Inf Sci"},{"issue":"21","key":"1167_CR6","doi-asserted-by":"publisher","first-page":"13557","DOI":"10.1007\/s11042-015-2759-2","volume":"75","author":"XY Luo","year":"2016","unstructured":"Luo XY, Song XF, Li XL, Zhang WM, Lu JC, Yang CF, Liu FL (2016) Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557\u201313583","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"1167_CR7","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S Dumitrescu","year":"2003","unstructured":"Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995\u20132007","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"1167_CR8","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsk\u00fd J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forens Secur 7(3):68\u201382","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"1167_CR9","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of IS&T\/SPIE electronic imaging, international society for optics and photonics, pp 83030A","DOI":"10.1117\/12.907495"},{"issue":"2","key":"1167_CR10","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Kodovsk\u00fd J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forens Secur 10(2):219\u2013228","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"1167_CR11","doi-asserted-by":"crossref","unstructured":"Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp 15\u201323","DOI":"10.1145\/2756601.2756608"},{"key":"1167_CR12","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support vector networks. Mach Learn 20:273\u2013297","journal-title":"Mach Learn"},{"issue":"2","key":"1167_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forens Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"1167_CR14","doi-asserted-by":"crossref","unstructured":"Schmidt WF, Kraaijveld MA, Duin RP (1992) Feedforward neural networks with random weights. In: Proceedings of 11th IAPR international conference on pattern recognition, conference B: pattern recognition methodology and systems, pp 1\u20134","DOI":"10.1109\/ICPR.1992.201708"},{"key":"1167_CR15","doi-asserted-by":"crossref","unstructured":"Chen YF, Chen FL, Wu T, Hu WT, Xu XH (2018) A deep learning model for secure cyber-physical transportation systems. In: Proceedings of IEEE conference on computer communications (INFOCOM 2018): POSTER, pp 1\u20132","DOI":"10.1109\/INFCOMW.2018.8406824"},{"issue":"2","key":"1167_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/0925-2312(94)90053-1","volume":"6","author":"YH Pao","year":"1994","unstructured":"Pao YH, Park GH, Sobajic DJ (1994) Learning and generalization characteristics of the random vector functional-link net. Neurocomputing 6(2):163\u2013180","journal-title":"Neurocomputing"},{"key":"1167_CR17","doi-asserted-by":"crossref","unstructured":"Chen YF, Shu L, Wang L (2017) Traffic flow prediction with big data: a deep learning based time series model. In: Proceedings of IEEE conference on computer communications (INFOCOM 2017), pp 1010\u20131011","DOI":"10.1109\/INFCOMW.2017.8116535"},{"key":"1167_CR18","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1016\/j.ins.2015.09.025","volume":"367","author":"L Zhang","year":"2016","unstructured":"Zhang L, Suganthan PN (2016) A comprehensive evaluation of random vector functional link networks. Inform Sci 367:1094\u20131105","journal-title":"Inform Sci"},{"key":"1167_CR19","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1016\/j.ins.2015.11.039","volume":"367","author":"Y Ren","year":"2016","unstructured":"Ren Y, Suganthan PN, Srikanth N, Amaratunga G (2016) Random vector functional link network for short-term electricity load demand forecasting. Inform Sci 367:1078\u20131093","journal-title":"Inform Sci"},{"issue":"1","key":"1167_CR20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0925-2312(99)00149-6","volume":"31","author":"GH Park","year":"2000","unstructured":"Park GH, Pao YH (2000) Unconstrained word-based approach for off-line script recognition using density-based random-vector functional-link net. Neurocomputing 31(1):45\u201365","journal-title":"Neurocomputing"},{"issue":"1\u20133","key":"1167_CR21","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","volume":"2","author":"S Wold","year":"1987","unstructured":"Wold S, Esbensen K, Geladi P (1987) Principal component analysis. Chemometrics Intell Lab Syst 2 (1\u20133):37\u201352","journal-title":"Chemometrics Intell Lab Syst"},{"issue":"3","key":"1167_CR22","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TPAMI.2007.70708","volume":"30","author":"X Jiang","year":"2008","unstructured":"Jiang X, Mandal B, Kot A (2008) Eigenfeature regularization and extraction in face recognition. IEEE Trans Pattern Anal Mach Intell 30(3):383\u2013394","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1167_CR23","volume-title":"Matrices: theory and applications","author":"D Serre","year":"2002","unstructured":"Serre D (2002) Matrices: theory and applications. Springer, New York"},{"key":"1167_CR24","unstructured":"Image data available at http:\/\/www.agents.cz\/boss\/BOSSFinal\/index.php?mode=VIEW&tmpl=materials"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1167-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1167-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1167-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:48:04Z","timestamp":1775256484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1167-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,1]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1167"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1167-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,1]]},"assertion":[{"value":"1 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}