{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:22:51Z","timestamp":1761675771409},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T00:00:00Z","timestamp":1279584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s11042-010-0564-5","type":"journal-article","created":{"date-parts":[[2010,7,19]],"date-time":"2010-07-19T09:42:26Z","timestamp":1279532546000},"page":"525-556","source":"Crossref","is-referenced-by-count":6,"title":["Audio steganalysis of spread spectrum information hiding based on statistical moment and distance metric"],"prefix":"10.1007","volume":"55","author":[{"given":"Wei","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Ruimin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Haojun","family":"Ai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,7,20]]},"reference":[{"key":"564_CR1","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1111\/1467-9868.00151","volume":"60","author":"F Abramovich","year":"1998","unstructured":"Abramovich F, Sapatinas T, Silverman BW (1998) Wavelet thresholding via a bayesian approach. J R Stat Soc Ser B 60:725\u2013749","journal-title":"J R Stat Soc Ser B"},{"key":"564_CR2","doi-asserted-by":"crossref","unstructured":"Altun O, Sharma G, Celik M, Bocko M (2005) Morphological steganalysis of audio signals and the principle of diminishing marginal distortions. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, pp 21\u201324","DOI":"10.1109\/ICASSP.2005.1415331"},{"issue":"2","key":"564_CR3","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/LSP.2005.862152","volume":"13","author":"I Avcibas","year":"2006","unstructured":"Avcibas I (2006) Audio steganalysis with content-independent distortion measures. IEEE Signal Process Lett 13(2):92\u201395","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"564_CR4","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221\u2013229","journal-title":"IEEE Trans Image Process"},{"key":"564_CR5","volume-title":"Fundamentals of convex analysis","author":"J Baptiste","year":"2004","unstructured":"Baptiste J, Urruty H, Lemarechal G (2004) Fundamentals of convex analysis. Springer-Verlag, Berlin"},{"issue":"2","key":"564_CR6","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/18.119735","volume":"28","author":"M Basseville","year":"1992","unstructured":"Basseville M, Benveniste A, Chou KC et al (1992) Modeling and estimation of multiresolution stochastic processes. IEEE Trans Inf Theory 28(2):766\u2013784","journal-title":"IEEE Trans Inf Theory"},{"issue":"3\u20134","key":"564_CR7","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruh D, Morimoto N et al (1996) Techniques for data hiding. IBM Syst J 35(3\u20134):313\u2013336","journal-title":"IBM Syst J"},{"key":"564_CR8","unstructured":"Chang CC, Lin CJ (2010) LIBSVM: a library for support vector machines. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm , April 2010"},{"key":"564_CR9","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.2307\/2965411","volume":"92","author":"G Chipman","year":"1997","unstructured":"Chipman G, Kolaczyk E, McCulloch R (1997) Adaptive bayesian wavelet shrinkage. J Am Stat Assoc 92:1413\u20131421","journal-title":"J Am Stat Assoc"},{"key":"564_CR10","unstructured":"Chou KC, Heck LP (1994) A multiscale stochastic modeling approach to the monitoring of mechanical systems. In: Proceedings of IEEE International Symposium on Time-Frequency, Time-Scale Analysis, pp 25\u201327"},{"key":"564_CR11","unstructured":"Christian K, Dittmann J (2009) The impact of information fusion in steganalysis on the example of audio steganalysis. Proceeding of Media Forensics and Security XI, vol.7524, 725409-725409-12"},{"issue":"4","key":"564_CR12","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1109\/78.668544","volume":"46","author":"MS Crouse","year":"1998","unstructured":"Crouse MS, Nowak RD, Baraniuk RG (1998) Wavelet-based statistical signal processing using hidden Markov models. IEEE Trans Signal Proc 46(4):886\u2013902","journal-title":"IEEE Trans Signal Proc"},{"key":"564_CR13","doi-asserted-by":"crossref","unstructured":"Cvejic N (2004) Algorithms for audio watermarking and steganography. Dissertation, University of OULU","DOI":"10.4018\/978-1-59140-518-4.ch006"},{"key":"564_CR14","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970104","volume-title":"Ten lectures on wavelets","author":"I Daubechies","year":"1992","unstructured":"Daubechies I (1992) Ten lectures on wavelets. Society for Industrial and Applied Mathematics, Philadelphia"},{"issue":"11","key":"564_CR15","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.1016\/S0165-1684(02)00304-3","volume":"82","author":"L Daudet","year":"2002","unstructured":"Daudet L, Torresani B (2002) Hybrid representation for audiophonic signal encoding. Signal Process 82(11):1595\u20131617","journal-title":"Signal Process"},{"key":"564_CR16","doi-asserted-by":"crossref","unstructured":"Farid H (2002) Detecting hidden messages using higher-order statistical models. In: Proceedings of IEEE International Conference on Image Processing, pp 905\u2013908","DOI":"10.1109\/ICIP.2002.1040098"},{"key":"564_CR17","doi-asserted-by":"crossref","unstructured":"Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In 6th International Workshop on Information Hiding, LNCS, vol. 3200, pp 67\u201381","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"564_CR18","doi-asserted-by":"crossref","unstructured":"Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol.6072, pp 1\u201313","DOI":"10.1117\/12.643254"},{"key":"564_CR19","unstructured":"Gordy JD, Bruton LT (2000) Performance evaluation of digital audio watermarking algorithms. In: Proceedings of the 43th IEEE Midwest Symposium on Circuits and Systems, Vol.1, pp 456\u2013459"},{"key":"564_CR20","unstructured":"Hamza O, Ismail A, Bulent S et al (2003) Steganalysis of audio based on audio quality metrics. In: Proceedings of SPIE on Security and Watermarking of Multimedia Contents, pp 55\u201366"},{"key":"564_CR21","doi-asserted-by":"crossref","unstructured":"Harmsen J, Pearlman W (2003) Steganalysis of additive noise modelable information hiding. In Proceedings of the SPIE, Security and Watermarking of Multimedia Contents V, 5020, 131\u2013142","DOI":"10.1117\/12.476813"},{"issue":"3","key":"564_CR22","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s11432-006-0273-x","volume":"49","author":"JH He","year":"2006","unstructured":"He JH, Huang JW (2006) Steganalysis of stochastic modulation steganography. Sci China F 49(3):273\u2013285","journal-title":"Sci China F"},{"key":"564_CR23","doi-asserted-by":"crossref","unstructured":"Holotyak T, Fridrich J, Voloshynovskiy S (2005) Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Proceedings of the 9th Conference on Communications and Multimedia Security, pp 273\u2013274","DOI":"10.1007\/11552055_31"},{"key":"564_CR24","doi-asserted-by":"crossref","unstructured":"Johnson M, Lyu S, Farid H (2005) Steganalysis of recorded speech. In Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 664\u2013672","DOI":"10.1117\/12.586941"},{"key":"564_CR25","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/TCOM.1967.1089532","volume":"15","author":"T Kailath","year":"1967","unstructured":"Kailath T (1967) The divergence and Bhattacharyya distance measures in signal selection. IEEE Trans Commun Technol 15:52\u201360","journal-title":"IEEE Trans Commun Technol"},{"key":"564_CR26","unstructured":"Kalpana S, Hamid RS, Alan CB (2005) Detecting spread spectrum watermarks using natural scene statistics. In Proceedings of IEEE International Conference on Image Processing, vol.2, 1106\u20131109"},{"key":"564_CR27","volume-title":"Error-correcting codes on channels with random structure","author":"VI Korzhik","year":"1975","unstructured":"Korzhik VI, Fink LM (1975) Error-correcting codes on channels with random structure. Svyaz, Moscow"},{"key":"564_CR28","doi-asserted-by":"crossref","unstructured":"Kraetzer C, Dittmann J (2007) Mel-cepstrum based steganalysis for voip-steganography. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, 650505.1-650505.12","DOI":"10.1117\/12.704040"},{"key":"564_CR29","doi-asserted-by":"crossref","unstructured":"Kraetzer C, Dittmann J (2008) Pros and cons of mel-cepstrum based audio steganalysis using SVM classification. In Lecture Notes in Computer Science, vol. 4567, 359\u2013377","DOI":"10.1007\/978-3-540-77370-2_24"},{"key":"564_CR30","doi-asserted-by":"crossref","unstructured":"Lang A, Dittmann J (2006) Profiles for evaluation: the usage of Audio WET. In SPIE conference at the Security, Steganography, and Watermarking of Multimedia Contents VIII, pp 60721J.1\u201360721J.13","DOI":"10.1117\/12.642695"},{"key":"564_CR31","volume-title":"Mixture density estimation. Advances in neural information processing systems","author":"JQ Li","year":"2000","unstructured":"Li JQ, Barron AR (2000) Mixture density estimation. Advances in neural information processing systems. MIT, Cambridge"},{"key":"564_CR32","doi-asserted-by":"crossref","unstructured":"Liu Y, Chiang K, Corbett C, Archibald R et al (2008) A novel audio steganalysis based on high-order statistics of a distortion measure with hausdorff distance. 11th Information Security Conference, Lecture Notes in Computer Science, vol.5222, 487\u2013501","DOI":"10.1007\/978-3-540-85886-7_33"},{"key":"564_CR33","doi-asserted-by":"crossref","unstructured":"Liu ZL, Pan XZ, Shi L, Wang JM, Ping LD (2006) Effective steganalysis based on statistical moments of differential characteristic function. In International Conference on Computational Intelligence and Security, vol. 2, 1195\u20131198","DOI":"10.1109\/ICCIAS.2006.295244"},{"key":"564_CR34","unstructured":"Liu QZ, Sung AH, Bernardete M, Ribeiro B (2008) Steganalysis of multiclass JPEG images based on expanded Markov features and polynomial fitting. In: Proceeding of IEEE International Joint Conference Neural Networks, pp 3351\u20133356"},{"key":"564_CR35","doi-asserted-by":"crossref","unstructured":"Liu Q, Sung A, Qiao M (2008) Detecting information-hiding in WAV audios. In Proceeding of 19th International Conference on Pattern Recognition, pp 1\u20134","DOI":"10.1109\/ICPR.2008.4761650"},{"issue":"3","key":"564_CR36","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/TIFS.2009.2024718","volume":"4","author":"Q Liu","year":"2009","unstructured":"Liu Q, Sung A, Qiao M (2009) Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans Inf Forensics Secur 4(3):359\u2013368","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"564_CR37","unstructured":"Liu Q, Sung A, Xu J, Ribeiro B (2006) Image complexity and feature extraction for steganalysis of LSB matching steganography. In: Proceedings of the 18th International Conference on Pattern Recognition, vol. 2, pp 267\u2013270"},{"key":"564_CR38","unstructured":"Liu SH, Yao HX, Gao W (2004) Steganalysis based on wavelet texture analysis and neural network. In: Proceeding of 5th World Congress on Intelligent Control and Automation, WCICA 2004, pp 4066\u20134069"},{"issue":"1","key":"564_CR39","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TIFS.2005.863485","volume":"1","author":"SW Lyu","year":"2006","unstructured":"Lyu SW, Farid H (2006) Steganalysis using high-order image statistics. IEEE Trans Inf Forensics Secur 1(1):111\u2013119","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"564_CR40","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1214\/aos\/1176348653","volume":"20","author":"JS Marron","year":"1992","unstructured":"Marron JS, Wand MP (1992) Exact mean integrated square error. Ann Stat 20(2):712\u2013736","journal-title":"Ann Stat"},{"key":"564_CR41","doi-asserted-by":"crossref","unstructured":"Qiao M, Sung A, Liu Q (2009) Feature Mining and Intelligent Computing for MP3 Steganalysis. International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS), pp 627\u2013630","DOI":"10.1109\/IJCBS.2009.119"},{"issue":"4","key":"564_CR42","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1631\/jzus.2006.A0577","volume":"7","author":"X Ru","year":"2006","unstructured":"Ru X, Zhang Y, Wu F (2006) Audio steganalysis based on negative resonance phenomenon caused by steganographic tools. Journal Zhejiang Univ, SCIENCE A 7(4):577\u2013583","journal-title":"Journal Zhejiang Univ, SCIENCE A"},{"issue":"2","key":"564_CR43","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y Rubner","year":"2000","unstructured":"Rubner Y, Tomasi C, Guibas LJ (2000) The earth mover\u2019s distance as a metric for image retrieval. Int J Comput Vision 40(2):99\u2013121","journal-title":"Int J Comput Vision"},{"key":"564_CR44","doi-asserted-by":"crossref","unstructured":"Sfikas G, Constantinopoulos C, Likas A, Galatsanos NP (2005) An analytic distance metric for Gaussian mixture models with application in image retrieval. In: Proceedings of 15th International Conference on Artificial Neural Networks, pp 835\u2013840","DOI":"10.1007\/11550907_132"},{"key":"564_CR45","doi-asserted-by":"crossref","unstructured":"Shi YQ, Chen CH, Chen W (2007) A markov process based approach to effective attacking JPEG steganography. In 8th International Workshop on Information Hiding, pp 249\u2013264","DOI":"10.1007\/978-3-540-74124-4_17"},{"key":"564_CR46","doi-asserted-by":"crossref","unstructured":"Shi YQ, Xuan GR, Yang CY, Gao JJ et al (2005) Effective steganalysis based on statistical moments of wavelet characteristic function. In IEEE International Conference on Information Technology: Coding and Computing, pp 768\u2013773","DOI":"10.1109\/ITCC.2005.138"},{"key":"564_CR47","doi-asserted-by":"crossref","unstructured":"Sullivan K, Madhow U, Chandrasekaran S, Manjunath BS (2005) Steganalysis of spread spectrum data hiding exploiting cover memory. In Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol.5681, pp 38\u201346","DOI":"10.1117\/12.588121"},{"key":"564_CR48","unstructured":"Sun YF, Liu FL, Liu B, Wang P (2008) Steganalysis based on difference image. 7th International Workshop on Digital Watermarking, IWDW 2008, LNCS 5450, pp 184\u2013198"},{"key":"564_CR49","volume-title":"Distance-based model selection with application to the analysis of gene expression data","author":"R Surajit","year":"2003","unstructured":"Surajit R (2003) Distance-based model selection with application to the analysis of gene expression data. University of Pennsylvania State, Dissertation"},{"key":"564_CR50","volume-title":"Detection, estimation, and modulation theory, Parts I\u2013II","author":"HL Trees Van","year":"1973","unstructured":"Van Trees HL (1973) Detection, estimation, and modulation theory, Parts I\u2013II. Wiley, Chichester"},{"issue":"1","key":"564_CR51","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1023\/A:1013844811137","volume":"15","author":"N Vlassis","year":"2002","unstructured":"Vlassis N, Likas A (2002) A greedy EM algorithm for Gaussian mixture learning. Neural Process Lett 15(1):77\u201387","journal-title":"Neural Process Lett"},{"key":"564_CR52","doi-asserted-by":"crossref","unstructured":"Wang Y, Moulin P (2003) Steganalysis of block-DCT image steganography. In: IEEE workshop on Statistical Signal Process, pp 339\u2013342","DOI":"10.1109\/SSP.2003.1289414"},{"issue":"6","key":"564_CR53","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIT.2008.921684","volume":"54","author":"Y Wang","year":"2008","unstructured":"Wang Y, Moulin P (2008) Perfectly secure steganography: capacity, error exponents, and code constructions. IEEE Trans Inf Theory 54(6):2706\u20132722","journal-title":"IEEE Trans Inf Theory"},{"key":"564_CR54","unstructured":"Wav surfer database (2010) http:\/\/www.wavsurfer.com . April 2010"},{"issue":"4","key":"564_CR55","first-page":"595","volume":"47","author":"QQ Wei","year":"2007","unstructured":"Wei QQ, Wang DS (2007) Steganalysis of LSB replacement based on wavelet transform. Journal of Tsinghua University (Sci&Tech) 47(4):595\u2013598","journal-title":"Journal of Tsinghua University (Sci&Tech)"},{"key":"564_CR56","doi-asserted-by":"crossref","unstructured":"Xuan G, Shi Y, Gao J et al (2005) Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Proceeding of Information Hiding Workshop, pp 262\u2013277","DOI":"10.1007\/11558859_20"},{"issue":"2","key":"564_CR57","first-page":"33","volume":"25","author":"WD Zhai","year":"2004","unstructured":"Zhai WD, Lv SW, Liu ZH (2004) Spatial stego-detecting algorithm in color images based on GGD. J China Inst Commun 25(2):33\u201342","journal-title":"J China Inst Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-010-0564-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-010-0564-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-010-0564-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T05:30:31Z","timestamp":1685683831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-010-0564-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,20]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["564"],"URL":"https:\/\/doi.org\/10.1007\/s11042-010-0564-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7,20]]}}}