{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:34Z","timestamp":1740122914311,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2017,6,3]],"date-time":"2017-06-03T00:00:00Z","timestamp":1496448000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-4878-4","type":"journal-article","created":{"date-parts":[[2017,6,2]],"date-time":"2017-06-02T19:08:06Z","timestamp":1496430486000},"page":"17973-17992","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Stego key recovery based on the optimal hypothesis test"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7612-9511","authenticated-orcid":false,"given":"Che","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jiufen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Junjun","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,3]]},"reference":[{"issue":"4","key":"4878_CR1","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1080\/18756891.2013.802116","volume":"6","author":"JY Chen","year":"2013","unstructured":"Chen JY, Liu JF, Zhang WM et al (2013) Cryptographic secrecy analysis of matrix embedding. International Journal of Computational Intelligence Systems 6(4):639\u2013647","journal-title":"International Journal of Computational Intelligence Systems"},{"key":"4878_CR2","unstructured":"Filler T, Pevny T, Bas P (2010) BOSS (Break Our Steganography System). http:\/\/www.agents.cz\/boss"},{"issue":"3","key":"4878_CR3","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/s00530-003-0100-9","volume":"9","author":"J Fridrich","year":"2003","unstructured":"Fridrich J, Goljan M, Hogea D et al (2003) Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9(3):288\u2013302","journal-title":"Multimedia Systems"},{"key":"4878_CR4","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Soukal D (2004) Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, pp 70\u201382","DOI":"10.1117\/12.521353"},{"key":"4878_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Soukal D, et al (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp 631\u2013642","DOI":"10.1117\/12.585987"},{"issue":"5","key":"4878_CR6","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security 9(5):814\u2013825","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4878_CR7","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, pp 59\u201368","DOI":"10.1145\/2482513.2482514"},{"key":"4878_CR8","unstructured":"Lehmann EL, Romano JP (2006) Testing statistical hypotheses. Springer Science & Business Media"},{"issue":"4","key":"4878_CR9","first-page":"309","volume":"7","author":"J Liu","year":"2012","unstructured":"Liu J, Tang GM (2012) Stego key estimation in LSB steganography. J Multimed 7(4):309\u2013313","journal-title":"J Multimed"},{"key":"4878_CR10","doi-asserted-by":"crossref","unstructured":"Liu JF, Chen JY, Zhang WM, et al (2010) Cryptographic secrecy analysis of matrix embedding. In: Proceedings of IEEE International Conference on Multimedia Information Networking and Security, Nanjing, pp 691\u2013695","DOI":"10.1109\/MINES.2010.150"},{"issue":"3","key":"4878_CR11","first-page":"1","volume":"59","author":"JF Liu","year":"2016","unstructured":"Liu JF, Tian YG, Han T et al (2016) Stego key searching for LSB steganography on JPEG decompressed image. SCIENCE CHINA Inf Sci 59(3):1\u201315","journal-title":"SCIENCE CHINA Inf Sci"},{"key":"4878_CR12","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd T, Ker AD (2014) Steganographic key leakage through payload metadata. In: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. ACM, pp 109\u2013114","DOI":"10.1145\/2600918.2600921"},{"key":"4878_CR13","unstructured":"Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. USENIX Association, pp 24\u201324"},{"key":"4878_CR14","unstructured":"Sallee P (2003) Model-based steganography. In: Proceedings of International workshop on digital watermarking. Springer Berlin Heidelberg, pp 154\u2013167"},{"key":"4878_CR15","doi-asserted-by":"crossref","unstructured":"Solanki K, Sarkar A, Manjunath B S (2007) YASS: yet another steganographic scheme that resists blind steganalysis. In: Proceedings of the 9th international conference on information hiding. Springer-Verlag, pp 16\u201331","DOI":"10.1007\/978-3-540-77370-2_2"},{"key":"4878_CR16","unstructured":"University of Granada, Computer Vision Group (2012) CVG-UGR image database. http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/"},{"key":"4878_CR17","unstructured":"Upham D (2008) JPEG-JSteg-V4, http:\/\/www.funet.fi\/pub\/crypt\/steganography\/jpeg-jsteg-v4.diff.gz"},{"key":"4878_CR18","doi-asserted-by":"crossref","unstructured":"Westfeld A (2001) F5-A Steganographic Algorithm. In: Proceedings of the 4th International Workshop on Information Hiding. Springer-Verlag, pp 289\u2013302","DOI":"10.1007\/3-540-45496-9_21"},{"issue":"2","key":"4878_CR19","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s10044-012-0303-9","volume":"17","author":"D Ziou","year":"2014","unstructured":"Ziou D, Jafari R (2014) Efficient steganalysis of images: learning is good for anticipation. Pattern Anal Applic 17(2):279\u2013289","journal-title":"Pattern Anal Applic"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4878-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4878-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4878-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T10:33:36Z","timestamp":1569407616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4878-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,3]]},"references-count":19,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["4878"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4878-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2017,6,3]]}}}