{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:58Z","timestamp":1740122878282,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2016,6,9]],"date-time":"2016-06-09T00:00:00Z","timestamp":1465430400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379152"],"award-info":[{"award-number":["61379152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["61402162"],"award-info":[{"award-number":["61402162"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["14JJ7024"],"award-info":[{"award-number":["14JJ7024"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100013286","name":"Specialized Research Fund for the Doctoral Program of Higher Education","doi-asserted-by":"crossref","award":["20130161120004"],"award-info":[{"award-number":["20130161120004"]}],"id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["61379152"],"award-info":[{"award-number":["61379152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11042-016-3632-7","type":"journal-article","created":{"date-parts":[[2016,6,9]],"date-time":"2016-06-09T09:30:00Z","timestamp":1465464600000},"page":"12417-12431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A game-theoretic method for designing distortion function in spatial steganography"],"prefix":"10.1007","volume":"76","author":[{"given":"Jun","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,9]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevny T (2011) Break our steganographic system-the ins and outs of organizing boss. In: Proceedings of international workshop on information hiding, Springer, pp 59\u201370","key":"3632_CR1","DOI":"10.1007\/978-3-642-24178-9_5"},{"doi-asserted-by":"crossref","unstructured":"B\u00f6hme R (2009) An epistemological approach to steganography. In: Proceedings of international workshop on information hiding, Springer, pp 15\u201330","key":"3632_CR2","DOI":"10.1007\/978-3-642-04431-1_2"},{"key":"3632_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14313-7","volume-title":"Advanced statistical steganalysis","author":"R Bohme","year":"2010","unstructured":"Bohme R (2010) Advanced statistical steganalysis. Springer, Berlin"},{"issue":"1","key":"3632_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2007.916006","volume":"3","author":"F Cayre","year":"2008","unstructured":"Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for WOA data hiding. IEEE Trans Inf Forensic Secur 3(1):1\u201315","journal-title":"IEEE Trans Inf Forensic Secur"},{"doi-asserted-by":"crossref","unstructured":"Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: Proceeding of IEEE international workshop on information forensics and security, pp 48\u201353","key":"3632_CR5","DOI":"10.1109\/WIFS.2014.7084302"},{"doi-asserted-by":"crossref","unstructured":"Ettinger M (1998) Steganalysis and game equilibria. In: Proceedings of international workshop on information hiding, Springer, pp 319\u2013328","key":"3632_CR6","DOI":"10.1007\/3-540-49380-8_22"},{"doi-asserted-by":"crossref","unstructured":"Filler T, Fridrich J (2010) Minimizing additive distortion functions with non-binary embedding operation in steganography. In: Proceedings of IEEE workshop on information forensics and security, pp 1\u20136","key":"3632_CR7","DOI":"10.1109\/WIFS.2010.5711444"},{"unstructured":"Filler T, Ker AD, Fridrich J (2009) The square root law of steganographic capacity for markov covers. In: Proceedings of SPIE international society for optical engineering, media forensics and security, pp 08\u201318","key":"3632_CR8"},{"issue":"3","key":"3632_CR9","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans Inf Forensic Secur 6(3):920\u2013935","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"3632_CR10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge Univisity Press, Cambridge"},{"doi-asserted-by":"crossref","unstructured":"Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. In: Proceedings of electronic imaging, security, steganography, and watermarking of multimedia contents IX, pp 02\u201303","key":"3632_CR11","DOI":"10.1117\/12.697471"},{"issue":"3","key":"3632_CR12","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"10","key":"3632_CR13","doi-asserted-by":"crossref","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J Fridrich","year":"2005","unstructured":"Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923\u20133935","journal-title":"IEEE Trans Signal Process"},{"issue":"1","key":"3632_CR14","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/TIFS.2005.863487","volume":"1","author":"J Fridrich","year":"2006","unstructured":"Fridrich J, Golian M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Inf Forensic Secur 1(1):102\u2013110","journal-title":"IEEE Trans Inf Forensic Secur"},{"doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of IEEE workshop on information forensic and security, pp 234\u2013239","key":"3632_CR15","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"3632_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"1","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. Eurasip J Inf Secur 1:1\u201313","journal-title":"Eurasip J Inf Secur"},{"doi-asserted-by":"crossref","unstructured":"Johnson B, Schottle P, B\u00f6hme R (2012) Where to hide the bits? In: Proceedings of international conference on decision and game theory for security, Springer, pp 1\u201317","key":"3632_CR17","DOI":"10.1007\/978-3-642-34266-0_1"},{"doi-asserted-by":"crossref","unstructured":"Ker AD (2007) Batch steganography and the threshold game. In: Proceedings of SPIE international society for optical engineering, media forensics and security, pp 0401\u20130413","key":"3632_CR18","DOI":"10.1117\/12.703334"},{"key":"3632_CR19","first-page":"5","volume":"IX","author":"A Kerckhoffs","year":"1883","unstructured":"Kerckhoffs A (1883) La cryptographie militaire. J Sci Mil IX:5\u201338","journal-title":"J Sci Mil"},{"issue":"2","key":"3632_CR20","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2011","unstructured":"Kodovsky J, Fridrich J, Holub V (2011) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensic Secur"},{"doi-asserted-by":"crossref","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proceedings of IEEE international conference on image process, pp 4206\u20134210","key":"3632_CR21","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"4","key":"3632_CR22","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28(4):21\u201327","journal-title":"J Vis Commun Image Represent"},{"key":"3632_CR23","doi-asserted-by":"crossref","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J Nash","year":"1951","unstructured":"Nash J (1951) Non-cooperative games. Ann Math 54:286\u2013295","journal-title":"Ann Math"},{"issue":"4","key":"3632_CR24","first-page":"165","volume":"42","author":"K Niu","year":"2015","unstructured":"Niu K, Li J, Liu J, Yang XY (2015) Strategic adaptive steganography based on game theory model. J Xidian Univ 42(4):165\u2013170","journal-title":"J Xidian Univ"},{"issue":"2","key":"3632_CR25","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd T, Bas P, Fridrich J (2010a) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inf Forensic Secur"},{"doi-asserted-by":"crossref","unstructured":"Pevn\u00fd T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of international workshop on information hiding, Springer, pp 161\u2013177","key":"3632_CR26","DOI":"10.1007\/978-3-642-16435-4_13"},{"issue":"3","key":"3632_CR27","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969\u2013978","journal-title":"IEEE Trans Image Process"},{"unstructured":"Schoettle P, Laszka A, Johnson B, Grossklags J, B\u00f6hme R. (2013) A game-theoretic analysis of content-adaptive ste-ganography with independent embedding. In: Proceedings of European signal processing conference, pp 1\u20135","key":"3632_CR28"},{"doi-asserted-by":"crossref","unstructured":"Schottle P, B\u00f6hme R (2013) A game-theoretic approach to content-adaptive steganography. In: Proceedings of international conference on information hiding, Springe, pp.125-141","key":"3632_CR29","DOI":"10.1007\/978-3-642-36373-3_9"},{"unstructured":"Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: Proceedings of SPIE media watermarking, security and forensics, pp 1\u201313","key":"3632_CR30"},{"doi-asserted-by":"crossref","unstructured":"Tang W, Li H, Luo W, Huang J (2014) Adaptive steganalysis against WOW embedding algorithm. In: Procedding of ACM workshop on information hiding and multimedia security, pp. 91\u201396","key":"3632_CR31","DOI":"10.1145\/2600918.2600935"},{"issue":"4","key":"3632_CR32","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, Liu Q, Xiong N (2014a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947\u20131962","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"3632_CR33","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, Wang B (2014b) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283\u20131291","journal-title":"Secur Commun Netw"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3632-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3632-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3632-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3632-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T22:57:17Z","timestamp":1589669837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3632-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,9]]},"references-count":33,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["3632"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3632-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,6,9]]}}}