{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:56Z","timestamp":1762004756097},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T00:00:00Z","timestamp":1447372800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11042-015-2984-8","type":"journal-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T09:19:28Z","timestamp":1447406368000},"page":"13627-13661","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine"],"prefix":"10.1007","volume":"75","author":[{"given":"S.","family":"Muthuramalingam","sequence":"first","affiliation":[]},{"given":"N","family":"Karthikeyan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Geetha","sequence":"additional","affiliation":[]},{"given":"Siva S. Sivatha","family":"Sindhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,13]]},"reference":[{"issue":"2","key":"2984_CR1","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221\u2013229","journal-title":"IEEE Trans Image Process"},{"key":"2984_CR2","doi-asserted-by":"crossref","unstructured":"Avcibas I, Memon N, kharrazi M, Sankur B (2005) Image steganalysis with binary similarity measures. J EURASIP, Appl Signal Process, Hindawi","DOI":"10.1155\/ASP.2005.2749"},{"key":"2984_CR3","unstructured":"Baker JE (1985) Adaptive selection methods for genetic algorithms. In Proc. 1st Int\u2019l Conf. On Genetic Algorithms. Pg 101\u2013111"},{"issue":"4","key":"2984_CR4","first-page":"1213","volume":"23","author":"V B\u00e1noci","year":"2014","unstructured":"B\u00e1noci V, Broda M, Bug\u00e1r G, Levick\u00fd D (2014) Universal image steganalytic method. Radio Eng 23(4):1213\u20131220","journal-title":"Radio Eng"},{"issue":"3\/4","key":"2984_CR5","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimot N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3\/4):313\u2013336","journal-title":"IBM Syst J"},{"key":"2984_CR6","unstructured":"Brown A. S-tools version 4.0. [Online]. Available: http:\/\/members.tripod.com\/steganography\/stego\/s-tools4.html"},{"key":"2984_CR7","unstructured":"Cachin C (1998) An information theoretic model for steganography, Lecture Notes in Computer Science: 2nd Int\u2019l Workshop on Information Hiding 1525, pp. 306\u2013318"},{"key":"2984_CR8","unstructured":"Candes EJ, Donoho DL (1999) Curvelets - a surprisingly effective nonadaptive representation for objects with edges,\u201d In: Cohen A, Rabut C, Schumaker LL (eds) Curve and surface fitting: Saint-Malo"},{"key":"2984_CR9","unstructured":"Chang C-C, Lin C-J: LIBSVM: a Library for Support Vector Machines, 2001, Available at http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm"},{"issue":"3","key":"2984_CR10","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/6046.944472","volume":"3","author":"Q Cheng","year":"2001","unstructured":"Cheng Q, Huang TS (2001) An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans Multimedia 3(3):273\u2013284","journal-title":"IEEE Trans Multimedia"},{"issue":"7","key":"2984_CR11","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1016\/j.jvcir.2013.05.007","volume":"24","author":"S Cho","year":"2013","unstructured":"Cho S, Cha B-H, Gawecki m, Jay Kuo C-C (2013) Block-based image steganalysis: algorithm and performance evaluation. J Vis Commun Image Represent 24(7):846\u2013856","journal-title":"J Vis Commun Image Represent"},{"issue":"12","key":"2984_CR12","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"2984_CR13","unstructured":"Dai M, Liu Y, Lin J (2008) Steganalysis based on feature reducts of rough set by using genetic algorithm, Proc. World Congress on Intelligent Control and Automation"},{"key":"2984_CR14","volume-title":"Pattern classification","author":"RO Duda","year":"2001","unstructured":"Duda RO, Hart PE, Stork DG (2001) Pattern classification. Wiley, New York"},{"key":"2984_CR15","doi-asserted-by":"crossref","unstructured":"Farid H (2002) Detecting hidden messages using higher-order statistical models. In: Image Processing. 2002. International Conference on, Rochester, NY, USA 905\u2013908","DOI":"10.1109\/ICIP.2002.1040098"},{"key":"2984_CR16","unstructured":"Fridrich J (2000) Miroslav Goljan and Dorin Hogea, Attacking the OutGuess, Proc. ACM Intl. Conf. Information security"},{"key":"2984_CR17","doi-asserted-by":"crossref","unstructured":"Fridrich J (2004) Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes, Proc. Int. Workshop. Information hiding, vol.3200, Lecture. Computer science","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"2984_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/12.465263","volume":"4675","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M (2002) Practical steganalysis of digital images-state of the art. Proc SPIE 4675:1\u201313","journal-title":"Proc SPIE"},{"key":"2984_CR19","unstructured":"Fridrich J, Goljan M, Hogea D (2003) New methodology for breaking steganographic techniques for JPEGs, Proc SPIE Electronic Imaging, Santa Clara, CA, pp. 143\u2013155"},{"key":"2984_CR20","unstructured":"Fu J-W, Qi Y-C, Yuan J-S (2007) Wavelet domain audio steganalysis based on statistical moments and PCA, Proc. IEEE Intl. Conf. Wavelet Analysis and Pattern recognition"},{"key":"2984_CR21","unstructured":"Geetha S, Sivatha Sindhu SS, Kamaraj N (2008) Steganalysis of LSB Embedded Images based on Adaptive Threshold Close Color Pair Signature, in Sixth IEEE Indian Conference on Computer Vision, Graphics and Image Processing ICVGIP 2008"},{"key":"2984_CR22","doi-asserted-by":"crossref","unstructured":"Goljan, Fridrich J (2015) CFA-aware features for steganalysis of color images, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XVIISan Francisco, CA","DOI":"10.1117\/12.2078399"},{"issue":"4","key":"2984_CR23","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TSP.2003.809368","volume":"51","author":"FP Gonzalez","year":"2003","unstructured":"Gonzalez FP, Balado F, Martin JRH (2003) Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Trans Signal Process 51(4):960\u2013980","journal-title":"IEEE Trans Signal Process"},{"issue":"7","key":"2984_CR24","first-page":"1404","volume":"27","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Tay KY, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Trans Neural Networks Learn Syst 27(7):1404\u20131416","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"2984_CR25","doi-asserted-by":"crossref","unstructured":"Harmsen JJ (2003) Steganalysis of additive noise modelable information hiding. Master\u2019s thesis, Rensselaer Polytechnic Institute, Troy, New York, USA","DOI":"10.1117\/12.476813"},{"key":"2984_CR26","unstructured":"Holland JH (1975) Adaptation in natural and artificial systems. University of Michigan Press (reprinted in 1992 by MIT Press, Cambridge, MA)"},{"key":"2984_CR27","doi-asserted-by":"crossref","unstructured":"Holotyak T, Fridrich J, Voloshynovskiy S (2005) Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Lecture Notes in Computer Science, Springer Berlin, Heidelberg, pp. 273\u2013274","DOI":"10.1007\/11552055_31"},{"issue":"8","key":"2984_CR28","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1049\/el:19980545","volume":"34","author":"J Huang","year":"1998","unstructured":"Huang J, Shi YQ (1998) Adaptive image watermarking scheme based on visual masking. Electron Lett 34(8):748\u2013750","journal-title":"Electron Lett"},{"key":"2984_CR29","unstructured":"Huo X (1999) Sparse image representation via combined transforms. PhD thesis, Stanford Univesity"},{"key":"2984_CR30","unstructured":"Images. [Online]. Available: http:\/\/www.cl.cam.ac.uk\/~fapp2\/watermarking\/benchmark\/image_database.html"},{"key":"2984_CR31","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"S Katzenbeisser","year":"2000","unstructured":"Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood"},{"key":"2984_CR32","unstructured":"Kaushal S, Anindya S, Manjunath BS (2007) YASS: Yet another steganographic scheme that resists blind steganalysis, 9th International Workshop on Information Hiding, Saint Malo, Brittany, France, Jun"},{"issue":"6","key":"2984_CR33","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1049\/el:19990327","volume":"35","author":"Y-S Kim","year":"1999","unstructured":"Kim Y-S, Kwon O-H, Park R-H (1999) Wavelet based watermarking method for digital images using the human visual system. Electron Lett 35(6):466\u2013468","journal-title":"Electron Lett"},{"key":"2984_CR34","unstructured":"Korejwa J. Jsteg shell 2.0. [Online]. Available: http:\/\/www.tiac.net\/users\/korejwa\/steg.htm"},{"key":"2984_CR35","unstructured":"Kutter M, Jordan F JK-PGS (Pretty Good Signature). [Online]. Available: http:\/\/ltswww.epfl.ch\/~kutter\/watermarking\/JK_PGS.html"},{"issue":"3","key":"2984_CR36","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1049\/ip-vis:20000341","volume":"147","author":"YK Lee","year":"2000","unstructured":"Lee YK, Chen LH (2000) High capacity image steganographic model. Proc Inst Elect Eng, Vis Image Signal Process 147(3):288\u2013294","journal-title":"Proc Inst Elect Eng, Vis Image Signal Process"},{"issue":"3","key":"2984_CR37","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/LSP.2013.2240385","volume":"20","author":"F Li","year":"2013","unstructured":"Li F, Zhang X, Chen B, Feng G (2013) JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier. IEEE Signal Process Lett 20(3):233\u2013236","journal-title":"IEEE Signal Process Lett"},{"key":"2984_CR38","unstructured":"Lie W-N, Chang L-C (1999) Data hiding in images with adaptive numbers of least significant bits based on human visual system, in Proc. IEEE Int. Conf. Image Processing, pp. 286\u2013290"},{"issue":"6","key":"2984_CR39","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1109\/TMM.2005.858377","volume":"7","author":"W-N Lie","year":"2005","unstructured":"Lie W-N, Lin G-S (2005) A feature-based classification technique for blind image steganalysis. IEEE Trans Multimedia 7(6):1007\u20131020","journal-title":"IEEE Trans Multimedia"},{"key":"2984_CR40","unstructured":"Lie W-N, Lin G-S, Wu C-L, Wang T-C (2000) Robust image watermarking on the DCT domain. Proc IEEE Int Symp Circ System I:228\u2013231"},{"key":"2984_CR41","doi-asserted-by":"crossref","unstructured":"Lyu S, Farid H (2006) Steganalysis using Higher-Order Image statistics. Proc IEEE Trans Inf Forensic Secur, Vol.1, no.1","DOI":"10.1109\/TIFS.2005.863485"},{"key":"2984_CR42","doi-asserted-by":"crossref","unstructured":"Manikopoulos C, Shi Y-Q, Song S, Zhang Z, Ni Z, Zou D (2002) Detection of block DCT-based steganography in gray-scale images. in Proc. 5th IEEE Workshop on Multimedia Signal Processing, pp. 355\u2013358","DOI":"10.1109\/MMSP.2002.1203319"},{"issue":"8","key":"2984_CR43","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"LM Marvel","year":"1999","unstructured":"Marvel LM, Boncelet CG Jr, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075\u20131083","journal-title":"IEEE Trans Image Process"},{"key":"2984_CR44","doi-asserted-by":"crossref","unstructured":"Min F (2007) A novel intrusion detection method based on combining ensemble learning with induction-Enhanced Particle Swarm Algorithm IEEE Third International Conference on Natural Computation (ICNC)","DOI":"10.1109\/ICNC.2007.115"},{"key":"2984_CR45","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66:385\u2013403","journal-title":"Signal Process"},{"key":"2984_CR46","doi-asserted-by":"crossref","unstructured":"Ogihara T, Nakamura D, Yokoya N (1996) Data embedding into pictorial with less distortion using discrete cosine transform. In: Proc. ICPR\u201996, pp. 675\u2013679","DOI":"10.1109\/ICPR.1996.546908"},{"key":"2984_CR47","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1038\/381607a0","volume":"381","author":"BA Olshausen","year":"1996","unstructured":"Olshausen BA, Field DJ (1996) Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature 381:607\u2013609","journal-title":"Nature"},{"issue":"7","key":"2984_CR48","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"AP Petitcolas","year":"1999","unstructured":"Petitcolas AP, Anderson RJ, Kuhn MG (1999) Information hiding\u2014A survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"issue":"4","key":"2984_CR49","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/TIFS.2008.2002936","volume":"3","author":"T Pevny","year":"2008","unstructured":"Pevny T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Trans Info Forensic Secur 3(4):635\u2013650","journal-title":"IEEE Trans Info Forensic Secur"},{"key":"2984_CR50","unstructured":"PictureMarc, Embed Watermark, v 1.00.45, Digimarc Corp Available: http:\/\/avcibas.home.uludag.edu.tr\/mmsp.pdf"},{"issue":"4","key":"2984_CR51","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"CI Podilchuk","year":"1998","unstructured":"Podilchuk CI, Wenjun Z (1998) Image-adaptive watermarking using visual models. IEEE J Select Areas Commun 16(4):525\u2013539","journal-title":"IEEE J Select Areas Commun"},{"key":"2984_CR52","first-page":"3937","volume":"7","author":"X-M Ru","year":"2005","unstructured":"Ru X-M, Zhang H-J, Huang X (2005) Steganalysis of audio: Attacking the steghide. Proc IEEE, Int Conf Mach Learn Cybern 7:3937\u20133942","journal-title":"Proc IEEE, Int Conf Mach Learn Cybern"},{"issue":"1","key":"2984_CR53","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/s11265-010-0460-2","volume":"61","author":"H Sajedi","year":"2010","unstructured":"Sajedi H, Jamzad M (2010) CBS: contourlet-based steganalysis method. J Signal Process Syst 61(1):367\u2013373","journal-title":"J Signal Process Syst"},{"key":"2984_CR54","doi-asserted-by":"crossref","unstructured":"Savoldi A, Gubian P (2007) Blind multi-class steganalysis system using wavelet statistics. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIHMSP'07, IEEE Computer Society, pp. 93\u201396","DOI":"10.1109\/IIHMSP.2007.4457661"},{"key":"2984_CR55","first-page":"509","volume":"2","author":"L Shaohui","year":"2003","unstructured":"Shaohui L, Hongxun Y, Wen G (2003) Neural Network based Steganalysis in Still images. Proc Int\u2019l Conf Multimedia Expo, ICME 2:509\u2013512","journal-title":"Proc Int\u2019l Conf Multimedia Expo, ICME"},{"key":"2984_CR56","doi-asserted-by":"crossref","unstructured":"Shi YQ, Xuan G, Yang C, Gao J, Zhang Z, Chai P, Zou D, Chen C, Chen W (2005) Effective steganalysis based on statistical moments of wavelet characteristic function. In: IEEE International Conference on Information Technology: Coding and Computing, ITCC&newapos;05, IEEE Computer Society, pp. 768\u2013773","DOI":"10.1109\/ITCC.2005.138"},{"issue":"6","key":"2984_CR57","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1109\/TIP.2002.1014998","volume":"11","author":"J Starck","year":"2001","unstructured":"Starck J, Candes EJ, Donoho DL (2001) The curvelet transform for image denoising. IEEE Trans Image Process 11(6):670\u2013684","journal-title":"IEEE Trans Image Process"},{"key":"2984_CR58","unstructured":"Steganos II Security Suite.. [Online]. Available: http:\/\/www.steganos.com\/english\/steganos\/download.htm"},{"key":"2984_CR59","doi-asserted-by":"publisher","unstructured":"Xia Z, Wang X, Sun X, Liu Q, Xiong N (2014) Steganalysis of LSB matching using differences between nonadjacent pixels\u201d, Multimedia Tools and Applications, Springer Verlag, pp. 1\u201316. doi: 10.1007\/s11042-014-2381-8","DOI":"10.1007\/s11042-014-2381-8"},{"issue":"8","key":"2984_CR60","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Networks 7(8):1283\u20131291","journal-title":"Secur Commun Networks"},{"key":"2984_CR61","doi-asserted-by":"crossref","unstructured":"Xu B, Zhang Z, Wang J, Liu X (2007) Improved BSS based Schemes for Active steganalysis, Proc. ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and parallel distributed computing","DOI":"10.1109\/SNPD.2007.465"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2984-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2984-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2984-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2984-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T14:11:34Z","timestamp":1567347094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2984-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,13]]},"references-count":61,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["2984"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2984-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,13]]}}}