{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:12:41Z","timestamp":1750911161131,"version":"3.41.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T00:00:00Z","timestamp":1506988800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-5201-0","type":"journal-article","created":{"date-parts":[[2017,10,4]],"date-time":"2017-10-04T08:53:48Z","timestamp":1507107228000},"page":"16347-16366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Universal Image Steganalysis System Based On Double Sparse Representation Classification (DSRC)"],"prefix":"10.1007","volume":"77","author":[{"given":"Arash","family":"Jalali","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Farsi","sequence":"additional","affiliation":[]},{"given":"Shahrokh","family":"Ghaemmaghami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,3]]},"reference":[{"key":"5201_CR1","first-page":"1","volume":"12","author":"M Abavisani","year":"2015","unstructured":"Abavisani M, Joneidi M, Rezaeifar S, Shokouhi SB (2015) A robust sparse representation based face recognition system for smartphones. IEEE Sig Process Med Biol Symp 12:1\u20136","journal-title":"IEEE Sig Process Med Biol Symp"},{"issue":"11","key":"5201_CR2","doi-asserted-by":"crossref","first-page":"4311","DOI":"10.1109\/TSP.2006.881199","volume":"54","author":"M Aharon","year":"2006","unstructured":"Aharon M, Elad M, Bruckstein A (2006) K-svd: an algorithm for designing overcomplete dictionaries for sparse representation. IEEE Trans Signal Process 54(11):4311\u20134322","journal-title":"IEEE Trans Signal Process"},{"key":"5201_CR3","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume":"5","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevn\u00fd T (2011) \u201cBreak our steganographic system\u201d, The Ins and Outs of organizing BOSS. In Inf Hiding 5:59\u201370","journal-title":"In Inf Hiding"},{"issue":"12","key":"5201_CR4","doi-asserted-by":"crossref","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"E Candes","year":"2006","unstructured":"Candes E, Tao T (2006) Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans Inf Theory 52(12):5406\u20135425","journal-title":"IEEE Trans Inf Theory"},{"issue":"8","key":"5201_CR5","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1002\/cpa.20124","volume":"59","author":"E Candes","year":"2006","unstructured":"Candes E, Romberg J, Tao T (2006) Stable signal recovery from incomplete and inaccurate measurements. Comm Pure Appl Math 59(8):1207\u20131233","journal-title":"Comm Pure Appl Math"},{"issue":"1","key":"5201_CR6","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1137\/S003614450037906X","volume":"43","author":"S Chen","year":"2001","unstructured":"Chen S, Donoho D, Saunders M (2001) Atomic decomposition by basis pursuit. SIAM Rev 43(1):129\u2013159","journal-title":"SIAM Rev"},{"issue":"1","key":"5201_CR7","first-page":"20","volume":"5","author":"P Constantinos","year":"2014","unstructured":"Constantinos P, Aroukatos N (2014) LSB and DCT steganographic detection using compressive sensing. J Inf Hiding Multimedia Sig Process 5(1):20\u201332","journal-title":"J Inf Hiding Multimedia Sig Process"},{"issue":"6","key":"5201_CR8","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1002\/cpa.20132","volume":"59","author":"D Donoho","year":"2006","unstructured":"Donoho D (2006) For most large underdetermined systems of linear equations the minimal l1-norm solution is also the sparsest solution. Comm Pure Appl Math 59(6):797\u2013829","journal-title":"Comm Pure Appl Math"},{"issue":"1","key":"5201_CR9","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/TIT.2005.860430","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL, Elad M, Temlyakov VN (2006) Stable recovery of sparse overcomplete representations in the presence of noise. IEEE Trans Inf Theory 52(1):6\u201318","journal-title":"IEEE Trans Inf Theory"},{"key":"5201_CR10","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1049\/iet-ipr.2013.0877","volume":"1","author":"F Farhat","year":"2015","unstructured":"Farhat F, Ghaemmaghami S (2015) Towards blind detection of low-rate spatial embedding in image steganalysis. IET Image Process 1:31\u201342","journal-title":"IET Image Process"},{"issue":"3","key":"5201_CR11","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1016\/j.ijforecast.2012.05.001","volume":"28","author":"JH Friedman","year":"2012","unstructured":"Friedman JH (2012) Fast sparse regression and classification. Int J Forecast 28(3):722\u2013738","journal-title":"Int J Forecast"},{"key":"5201_CR12","doi-asserted-by":"crossref","unstructured":"Gao S, Tsang IW, Chia L, Zhao P (2010) Local features are not lonely \u2013 Laplacian sparse coding for image classification. Proc IEEE Conf Comput Vis Pattern Recognit","DOI":"10.1109\/CVPR.2010.5539943"},{"issue":"7","key":"5201_CR13","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1109\/TASL.2011.2112350","volume":"19","author":"JF Gemmeke","year":"2011","unstructured":"Gemmeke JF, Virtanen T, Hurmalainen A (2011) Exemplarbased sparse representations for noise robust automatic speech recognition. IEEE Trans Audio Speech Lang Process 19(7):2067\u20132080","journal-title":"IEEE Trans Audio Speech Lang Process"},{"issue":"6","key":"5201_CR14","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1109\/34.927464","volume":"23","author":"A Georghiades","year":"2001","unstructured":"Georghiades A, Belhumeur P, Kriegman D (2001) From few to many: Illumination cone models for face recognition under variable lighting and pose. IEEE Trans Pattern Anal Mach Intell 23(6):643\u2013660","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5201_CR15","volume-title":"CFA-aware features for steganalysis of color images","author":"M Goljan","year":"2015","unstructured":"Goljan M, Fridrich J (2015) CFA-aware features for steganalysis of color images. Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics, San Francisco"},{"key":"5201_CR16","doi-asserted-by":"crossref","first-page":"4961","DOI":"10.1016\/j.optcom.2012.07.121","volume":"11","author":"R Gong","year":"2012","unstructured":"Gong R, Wang H (2012) Steganalysis for GIF images based on colors-gradient co-occurrence matrix. Opt Commun, ELSVIER 11:4961\u20134965","journal-title":"Opt Commun"},{"key":"5201_CR17","first-page":"1","volume":"1","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 1:1\u201313","journal-title":"EURASIP J Inf Secur"},{"key":"5201_CR18","doi-asserted-by":"crossref","unstructured":"Huang J, Yang M (2010) Fast sparse representation with prototypes. Proc IEEE Conf Comput Vis Pattern Recognit 3618\u20134625","DOI":"10.1109\/CVPR.2010.5539919"},{"key":"5201_CR19","doi-asserted-by":"crossref","unstructured":"Jiang Z, Lin Z, Davis LS (2011) Learning a discriminative dictionary for sparse coding via label consistent K-SVD. Proc IEEE Conf Comput Vis Pattern Recognit","DOI":"10.1109\/CVPR.2011.5995354"},{"issue":"1","key":"5201_CR20","first-page":"69","volume":"9","author":"S Jinyang","year":"2015","unstructured":"Jinyang S, Xianting Z, Lei W (2015) Steganalysis using regional correlation and second-order Markov features. Int J Secur Appl 9(1):69\u201376","journal-title":"Int J Secur Appl"},{"key":"5201_CR21","first-page":"309","volume":"1","author":"C Kuang-Yu","year":"2014","unstructured":"Kuang-Yu C, Cheng-Fu L, Chu-Song C, Yi-Ping H (2014) Single-pass K-SVD for efficient dictionary learning, springer. Circuits Syst Signal Process 1:309\u2013320","journal-title":"Circuits Syst Signal Process"},{"issue":"7","key":"5201_CR22","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/LSP.2013.2245894","volume":"20","author":"W Li","year":"2013","unstructured":"Li W, Zhou Y, Poh N et al (2013) Feature denoising using joint sparse representation for in-car speech recognition. IEEE Sig Process Lett 20(7):681\u2013684","journal-title":"IEEE Sig Process Lett"},{"key":"5201_CR23","doi-asserted-by":"crossref","unstructured":"Liang RZ, Shi L, Wang H, Meng J, Wang JJY, Sun Q, Gu Y (2016) Optimizing top precision performance measure of content-based image retrieval by learning similarity function. In: Pattern Recogn (ICPR), 2016 23rd Int Conf (pp. 2954\u20132958) IEEE","DOI":"10.1109\/ICPR.2016.7900086"},{"issue":"12","key":"5201_CR24","doi-asserted-by":"crossref","first-page":"3403","DOI":"10.1109\/TSP.2004.837423","volume":"52","author":"Q Liu","year":"2004","unstructured":"Liu Q, Wang Q, Wu L (2004) Size of the dictionary in matching pursuit algorithm. IEEE Trans Signal Process 52(12):3403\u20133408","journal-title":"IEEE Trans Signal Process"},{"issue":"4","key":"5201_CR25","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1109\/TPAMI.2011.156","volume":"34","author":"J Mairal","year":"2010","unstructured":"Mairal J, Bach F, Ponce J (2010) Task-driven dictionary learning. IEEE Trans Pattern Anal Mach Intell 34(4):791\u2013804","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5201_CR26","first-page":"1744","volume":"7","author":"H Malekmohammadi","year":"2009","unstructured":"Malekmohammadi H, Ghaemmaghami S (2009) Steganalysis of LSB based image steganography using spatial and frequency domain features. IEEE Int Conf Multimedia Expo 7:1744\u20131747","journal-title":"IEEE Int Conf Multimedia Expo"},{"issue":"2","key":"5201_CR27","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/34.908974","volume":"23","author":"AM Matinez","year":"2001","unstructured":"Matinez AM, Kak AC (2001) PCA versus LDA. IEEE Trans Pattern Anal Mach Intell 23(2):228\u2013233","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5201_CR28","first-page":"7457","volume":"12","author":"L Nanni","year":"2013","unstructured":"Nanni L, Brahnam S, Ghidoni S, Menegatti E, Barrier T (2013) A comparison of multi-scale approaches for extracting image descriptors from the co-occurrence matrix. PLoS One, Public Library of Science , Expert Systems with Applications 12:7457\u20137467","journal-title":"PLoS One"},{"key":"5201_CR29","unstructured":"Nene S, Nayar S, Murase H (1996) Columbia object image library (coil-20), technical report CUCS-005-96. Tech Rep"},{"issue":"3","key":"5201_CR30","doi-asserted-by":"crossref","first-page":"1553","DOI":"10.1109\/TSP.2009.2036477","volume":"58","author":"R Rubinstein","year":"2010","unstructured":"Rubinstein R, Zibulevsky M, Elad M (2010) Double sparsity: Learning sparse dictionaries for sparse signal approximation. IEEE Trans Signal Process 58(3):1553\u20131564","journal-title":"IEEE Trans Signal Process"},{"key":"5201_CR31","first-page":"4758","volume-title":"Speech enhancement with sparse coding in learned dictionaries","author":"CD Sigg","year":"2010","unstructured":"Sigg CD, Dikk T, Buhmann JM (2010) Speech enhancement with sparse coding in learned dictionaries. Proc. ICASSP, Dallas, pp 4758\u20134761"},{"key":"5201_CR32","doi-asserted-by":"crossref","first-page":"1763","DOI":"10.1109\/TIP.2015.2409572","volume":"6","author":"U Srinivas","year":"2015","unstructured":"Srinivas U, Suo Y, Dao M, Monga V, Tran TD (2015) Structured sparse priors for image classification. IEEE Trans Image Process 6:1763\u20131776","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"5201_CR33","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1109\/JPROC.2010.2044010","volume":"98","author":"JA Tropp","year":"2010","unstructured":"Tropp JA, Wright SJ (2010) Computational methods for sparse solution of linear inverse problems. Proc IEEE 98(6):948\u2013958","journal-title":"Proc IEEE"},{"issue":"6","key":"5201_CR34","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1109\/TNNLS.2012.2191620","volume":"23","author":"S Wang","year":"2012","unstructured":"Wang S, Yang J, Sun M, Peng X, Sun M, Zhou C (2012) Sparse tensor discriminant color space for face verification. IEEE Trans Neural Netw Learn Syst 23(6):876\u2013888","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"2","key":"5201_CR35","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TPAMI.2008.79","volume":"31","author":"J Wright","year":"2009","unstructured":"Wright J, Yang AY, Ganesh A, Sastry SS, Ma Y (2009) Robust face recognition via sparse representation. IEEE Trans Pattern Anal Mach Intell 31(2):210\u2013227","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5201_CR36","doi-asserted-by":"crossref","unstructured":"Wright J, Ma Y, Mairal J, Sapiro G, Huwang TS, Yan S (2010) Sparse representation for computer vision and pattern recognition. Proceedings of the IEEE, 6:1031\u20131044","DOI":"10.1109\/JPROC.2010.2044470"},{"key":"5201_CR37","first-page":"215","volume":"8","author":"B Xu","year":"2007","unstructured":"Xu B, Wang J, Liu X, Zhang Z (2007) Passive steganalysis using image quality metrics and multi-class support vector machine. Third Int Conf Nat Comput, ICNC 8:215\u2013220","journal-title":"Third Int Conf Nat Comput, ICNC"},{"key":"5201_CR38","first-page":"543","volume":"12","author":"B Yamini","year":"2013","unstructured":"Yamini B, Sabitha R (2013) Blind steganalytic attack as pattern recognition, using K-nearest neighbor classification technique. IEEE 5th Int Conf Adv Comput(ICoAC) 12:543\u2013546","journal-title":"IEEE 5th Int Conf Adv Comput(ICoAC)"},{"key":"5201_CR39","first-page":"1118","volume":"9","author":"XY Yu","year":"2009","unstructured":"Yu XY, Wang A (2009) An Investigation of genetic algorithm on steganalysis techniques. IEEE Int Conf Intell Inf Hiding Multimedia Sig Process 9:1118\u20131121","journal-title":"IEEE Int Conf Intell Inf Hiding Multimedia Sig Process"},{"key":"5201_CR40","first-page":"41","volume":"11","author":"XY Yu","year":"2009","unstructured":"Yu XY, Wang A (2009) Steganalysis based on regression model and bayesion network. IEEE Int Conf Multimedia Inf Netw Secur, MINES'09 11:41\u201344","journal-title":"IEEE Int Conf Multimedia Inf Netw Secur"},{"key":"5201_CR41","first-page":"437","volume":"12","author":"Z Zhang","year":"2013","unstructured":"Zhang Z, Hu D, Yang Y, Su B (2013) A universal digital image steganalysis method based on sparse representation. Int Conf Comput Intell Secur (CIS) 12:437\u2013441","journal-title":"Int Conf Comput Intell Secur (CIS)"},{"key":"5201_CR42","doi-asserted-by":"crossref","unstructured":"Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and weighted sparse representation classification [J]. Clust Comput:1\u20139","DOI":"10.1007\/s10586-017-0859-7"},{"key":"5201_CR43","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1109\/ACCESS.2015.2430359","volume":"3","author":"Z Zheng","year":"2015","unstructured":"Zheng Z (2015) A survey of sparse representation: algorithms and applications. IEEE Access 3:490\u2013530","journal-title":"IEEE Access"},{"key":"5201_CR44","first-page":"1365","volume":"7","author":"D Zou","year":"2006","unstructured":"Zou D, Shi YQ, Su W, Xuan G (2006) Steganalysis based on Markov model of thresholded prediction-error image. IEEE Int Conf Multimedia Expo 7:1365\u20131368","journal-title":"IEEE Int Conf Multimedia Expo"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5201-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5201-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5201-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T00:16:45Z","timestamp":1750897005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5201-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,3]]},"references-count":44,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5201"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5201-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2017,10,3]]}}}