{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T02:36:41Z","timestamp":1767494201425,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2017,8,3]],"date-time":"2017-08-03T00:00:00Z","timestamp":1501718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636102"],"award-info":[{"award-number":["U1636102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1536105"],"award-info":[{"award-number":["U1536105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Technology Research and Development Program","award":["2014BAH41B01"],"award-info":[{"award-number":["2014BAH41B01"]}]},{"name":"National Key Technology Research and Develop Program","award":["2016YFB0801003"],"award-info":[{"award-number":["2016YFB0801003"]}]},{"name":"National Key Technology Research and Develop Program","award":["2016QY15Z2500"],"award-info":[{"award-number":["2016QY15Z2500"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11042-017-5016-z","type":"journal-article","created":{"date-parts":[[2017,8,3]],"date-time":"2017-08-03T14:34:01Z","timestamp":1501770841000},"page":"14093-14113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6790-5694","authenticated-orcid":false,"given":"Zengzhen","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Qingxiao","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Changjun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,3]]},"reference":[{"key":"5016_CR1","first-page":"48","volume-title":"Proceedings of the IEEE international workshop on information forensic and security. Atlanta","author":"T Denemark","year":"2014","unstructured":"Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of the IEEE international workshop on information forensic and security. Atlanta, pp 48\u201353"},{"key":"5016_CR2","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6:920\u2013935","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5016_CR3","first-page":"59","volume-title":"IH. LNCS, vol 6958","author":"T Filler","year":"2011","unstructured":"Filler T, Pevn\u00fd T, Bas P (2011) Break our steganographic system: the ins and outs of organizing BOSS. In: Filler T, Pevn\u00fd T, Craver S, Ker A (eds) IH. LNCS, vol 6958, pp 59\u201370"},{"key":"5016_CR4","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsk\u00fd J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7:868\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5016_CR5","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J Fridrich","year":"2005","unstructured":"Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53:3923\u20133935","journal-title":"IEEE Trans Signal Process"},{"key":"5016_CR6","first-page":"169","volume-title":"IEEE International workshop on information forensic and security (WIFS). Tenerife","author":"L Guo","year":"2012","unstructured":"Guo L, Ni j Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding. In: IEEE International workshop on information forensic and security (WIFS). Tenerife, pp 169\u2013174"},{"key":"5016_CR7","first-page":"234","volume-title":"Proceedings of the IEEE international workshop on information forensic and security. Tenerife","author":"V Holub","year":"2012","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of the IEEE international workshop on information forensic and security. Tenerife, pp 234\u2013239"},{"key":"5016_CR8","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Trans Inf Forensics Secur 8:1996\u20132006","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5016_CR9","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/2482513.2482514","volume-title":"Proceedings of the 1st ACM workshop information hiding multimedia security. ACM, New York","author":"V Holub","year":"2013","unstructured":"Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM workshop information hiding multimedia security. ACM, New York, pp 59\u201368"},{"key":"5016_CR10","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10:219\u2013228","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5016_CR11","first-page":"1","volume-title":"ACM Proceeding of the on multimedia and security. ACM, New York,","author":"A Ker","year":"2012","unstructured":"Ker A, Pevn\u00fd T (2012) Batch steganography in the real world. In: ACM Proceeding of the on multimedia and security. ACM, New York, pp 1\u201310"},{"key":"5016_CR12","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1411328.1411349","volume-title":"Proceedings of the 10th ACM workshop on multimedia and security. ACM, New York","author":"A Ker","year":"2008","unstructured":"Ker A, Pevn\u00fd T, Kodovsk\u00fd J, Fridrich J (2008) The square root law of steganographic capacity. In: Proceedings of the 10th ACM workshop on multimedia and security. ACM, New York, pp 107\u2013116"},{"key":"5016_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7:432\u2013444","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5016_CR14","first-page":"4206","volume-title":"Proceedings of the IEEE International conference on image processing. Paris","author":"B Li","year":"2014","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proceedings of the IEEE International conference on image processing. Paris, pp 4206\u20134210"},{"key":"5016_CR15","first-page":"161","volume-title":"Information hiding (Lecture Notes in Computer Science). Springer-Verlag, Berlin","author":"T Pevny","year":"2010","unstructured":"Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Information hiding (Lecture Notes in Computer Science). Springer-Verlag, Berlin, pp 161\u2013177"},{"key":"5016_CR16","first-page":"154","volume-title":"Digital watermarking (Lecture Notes in Computer Science), vol 2939","author":"P Sallee","year":"2003","unstructured":"Sallee P (2003) Model-based steganography. In: Digital watermarking (Lecture Notes in Computer Science), vol 2939, pp 154\u2013167"},{"unstructured":"Shllee P Matlab JPEG Toolbox [Online]. Available: http:\/\/www.philsallee.com\/jpegtbx\/index.html","key":"5016_CR17"},{"key":"5016_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2756601.2756608","volume-title":"Proceedings of the 3th ACM workshop information on hiding multimedia security. ACM, New York","author":"X Song","year":"2015","unstructured":"Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: Proceedings of the 3th ACM workshop information on hiding multimedia security. ACM, New York, pp 15\u201323"},{"key":"5016_CR19","first-page":"289","volume-title":"Information hiding (Lecture Notes in Computer Science), vol 2137","author":"A Westfeld","year":"2001","unstructured":"Westfeld A (2001) F5-A steganographic algorithm. In: Information hiding (Lecture Notes in Computer Science), vol 2137, pp 289\u2013302"},{"key":"5016_CR20","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/2909827.2930802","volume-title":"Proceedings on the 4th ACM workshop information on hiding multimedia security. ACM, New York","author":"Z Zhao","year":"2016","unstructured":"Zhao Z, Guan Q, Zhao X (2016) Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography. In: Proceedings on the 4th ACM workshop information on hiding multimedia security. ACM, New York, pp 139\u2013148"},{"key":"5016_CR21","volume-title":"The 15th international workshop on digital-forensics and watermarking (IWDW2016), accepted","author":"Z Zhao","year":"2016","unstructured":"Zhao Z, Guan Q, Zhao X, Yu H, liu C (2016) Embedding strategy for batch adaptive steganography. In: The 15th international workshop on digital-forensics and watermarking (IWDW2016), accepted"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5016-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5016-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5016-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T19:35:03Z","timestamp":1659296103000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5016-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,3]]},"references-count":21,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5016"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5016-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2017,8,3]]},"assertion":[{"value":"22 December 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}