{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:26:47Z","timestamp":1740122807344,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T00:00:00Z","timestamp":1499126400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636102","U1536105"],"award-info":[{"award-number":["U1636102","U1536105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Technology R&D Program","award":["2014BAH41B01","2016YFB0801003"],"award-info":[{"award-number":["2014BAH41B01","2016YFB0801003"]}]},{"name":"Strategic Priority Research Program of CAS","award":["XDA06030600"],"award-info":[{"award-number":["XDA06030600"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-4955-8","type":"journal-article","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:32:59Z","timestamp":1499142779000},"page":"17889-17911","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Priori knowledge based secure payload estimation"],"prefix":"10.1007","volume":"77","author":[{"given":"Sai","family":"Ma","sequence":"first","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qingxiao","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Zhoujun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,4]]},"reference":[{"key":"4955_CR1","doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevny T (2011) \u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS. In: Proceedings of international workshop on information hiding, pp 59\u201370","DOI":"10.1007\/978-3-642-24178-9_5"},{"issue":"21","key":"4955_CR2","doi-asserted-by":"crossref","first-page":"13679","DOI":"10.1007\/s11042-015-2825-9","volume":"75","author":"Y-H Chen","year":"2016","unstructured":"Chen Y-H, Huang H-C, Lin C-C (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimedia Tools and Applications 75(21):13679\u201313704","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"4955_CR3","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/JDT.2013.2295619","volume":"10","author":"C-J Cheng","year":"2014","unstructured":"Cheng C-J, Hwang W-J, Zeng H-Y, Lin Y-C (2014) A Fragile watermarking algorithm for hologram authentication. J Disp Technol 10(4):263\u2013271","journal-title":"J Disp Technol"},{"issue":"12","key":"4955_CR4","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"4955_CR5","doi-asserted-by":"crossref","unstructured":"Denemark T, Sedighi V, Holub V, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of 2014 IEEE international workshop on information forensics and security, pp 48\u201353","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"4","key":"4955_CR6","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","volume":"5","author":"T Filler","year":"2010","unstructured":"Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensics Secur 5(4):705\u2013720","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"4955_CR7","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920\u2013935","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4955_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. In: Proceedings of the 9th IS&T\/SPIE electronic imaging, vol 6505, pp 01\u201315","DOI":"10.1117\/12.697471"},{"issue":"3","key":"4955_CR9","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4955_CR10","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of 2012 IEEE international workshop on information forensics and security, pp 234\u2013239","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"4955_CR11","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security, pp 59\u201368","DOI":"10.1145\/2482513.2482514"},{"issue":"2","key":"4955_CR12","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219\u2013228","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"4955_CR13","doi-asserted-by":"crossref","first-page":"9717","DOI":"10.3390\/s111009717","volume":"11","author":"H-C Huang","year":"2011","unstructured":"Huang H-C, Fang W-C (2011) Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10):9717\u20139731","journal-title":"Sensors"},{"issue":"2","key":"4955_CR14","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4955_CR15","doi-asserted-by":"crossref","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proceedings of 2014 IEEE international conference on image processing, pp 4206\u20134210","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"2","key":"4955_CR16","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4955_CR17","doi-asserted-by":"crossref","unstructured":"Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th international workshop on information hiding, vol 6387, pp 161\u2013177","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"4955_CR18","unstructured":"Provos N (2001) Defending against statistical steganalysis. In: Proceedings of usenix security symposium, vol 10, pp 323\u2013336"},{"key":"4955_CR19","unstructured":"Sallee P (2003) Model-based steganography. In: Proceedings of the 2nd international workshop on digital watermarking, pp 154\u2013167"},{"issue":"2","key":"4955_CR20","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221\u2013234","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4955_CR21","doi-asserted-by":"crossref","unstructured":"Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp 15\u201323","DOI":"10.1145\/2756601.2756608"},{"issue":"2","key":"4955_CR22","first-page":"404","volume":"8","author":"R Wazirali","year":"2017","unstructured":"Wazirali R, Chaczko Z (2017) Anticipatory quality assessment metric for measuring data hiding imperceptibility. Journal of Information Hiding and Multimedia Signal Processing 8(2):404\u2013412","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"4955_CR23","doi-asserted-by":"crossref","unstructured":"Westfeld A (2001) F5-a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of the 4th international workshop on information hiding, vol 2137, pp 289\u2013302","DOI":"10.1007\/3-540-45496-9_21"},{"key":"4955_CR24","doi-asserted-by":"crossref","unstructured":"Zhang L, Chen D, Cao Y, Zhao X (2015) A practical method to determine achievable rates for secure steganography. In: Proceedings of the 17th IEEE international conference on high performance computing and communications, the 7th IEEE international symposium on cyberspace safety and security, the 12th IEEE international conference on embedded software and systems, pp 1274\u20131281","DOI":"10.1109\/HPCC-CSS-ICESS.2015.62"},{"issue":"3","key":"4955_CR25","first-page":"530","volume":"7","author":"Z-W Zhang","year":"2016","unstructured":"Zhang Z-W, Wu L-F, Lai H-G, Li H-B, Zheng C-H (2016) Double reversible watermarking algorithm for image tamper detection. Journal of Information Hiding and Multimedia Signal Processing 7(3):530\u2013542","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4955-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4955-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4955-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T06:41:33Z","timestamp":1532414493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4955-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,4]]},"references-count":25,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["4955"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4955-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2017,7,4]]}}}