{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:14:50Z","timestamp":1761581690544},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T00:00:00Z","timestamp":1524614400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"crossref","award":["KJ-15-106"],"award-info":[{"award-number":["KJ-15-106"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11042-018-6010-9","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T07:24:52Z","timestamp":1524641092000},"page":"27955-27979","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Steganography algorithms recognition based on match image and deep features verification"],"prefix":"10.1007","volume":"77","author":[{"given":"Xiaoyu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yifeng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"6010_CR1","first-page":"59","volume-title":"Break Our steganographic system: The ins and outs of organizing BOSS [C]\/\/international workshop on information hiding","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevn\u00fd T (2011) Break Our steganographic system: The ins and outs of organizing BOSS [C]\/\/international workshop on information hiding. Springer, Berlin Heidelberg, pp 59\u201370"},{"key":"6010_CR2","unstructured":"Boroumand M, Fridrich J. (2016) Boosting Steganalysis with explicit feature maps [C]\/\/proceedings of the 4th ACM workshop on information hiding and multimedia security. ACM: 149\u2013157"},{"issue":"7","key":"6010_CR3","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.jvcir.2013.05.007","volume":"24","author":"S Cho","year":"2013","unstructured":"Cho S, Cha BH, Gawecki M, Jay Kuo CC (2013) Block-based image steganalysis: algorithm and performance evaluation [J]. J Vis Commun Image Represent 24(7):846\u2013856","journal-title":"J Vis Commun Image Represent"},{"key":"6010_CR4","unstructured":"Denemark T, Sedighi V, Holub V et al. (2014) Selection-channel-aware rich model for steganalysis of digital images [C]\/\/information forensics and security (WIFS), 2014 I.E. international workshop on. IEEE : 48\u201353"},{"key":"6010_CR5","first-page":"199","volume-title":"Multi-class blind steganalysis based on image run-length analysis [C]\/\/international workshop on digital watermarking","author":"J Dong","year":"2009","unstructured":"Dong J, Wang W, Tan T (2009) Multi-class blind steganalysis based on image run-length analysis [C]\/\/international workshop on digital watermarking. Springer, Berlin Heidelberg, pp 199\u2013210"},{"key":"6010_CR6","volume-title":"Pattern classification [M]","author":"RO Duda","year":"1973","unstructured":"Duda RO, Hart PE, Stork DG (1973) Pattern classification [M]. Wiley, New York"},{"key":"6010_CR7","unstructured":"Duda RO, Hart PE, Stork DG (2012) Pattern classification [M]. John Wiley & Sons"},{"issue":"4","key":"6010_CR8","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","volume":"5","author":"T Filler","year":"2010","unstructured":"Filler T, Fridrich J (2010) Gibbs construction in steganography [J]. IEEE Trans Inform Forensics Sec 5(4):705\u2013720","journal-title":"IEEE Trans Inform Forensics Sec"},{"issue":"3","key":"6010_CR9","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images [J]. IEEE Trans Inform Forensics Sec 7(3):868\u2013882","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"6010_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich JJ, Kodovsk\u00fd J (2013) Multivariate gaussian model for designing additive distortion for steganography [C]\/\/ICASSP: 2949\u20132953","DOI":"10.1109\/ICASSP.2013.6638198"},{"key":"6010_CR11","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters [C]\/\/information forensics and security (WIFS), 2012 I.E. international workshop on. IEEE: 234\u2013239"},{"issue":"12","key":"6010_CR12","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis [J]. IEEE Trans Inform Forensics Sec 8(12):1996\u20132006","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"6010_CR13","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2013) Digital image steganography using universal distortion [C]\/\/. Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. ACM: 59\u201368","DOI":"10.1145\/2482513.2482514"},{"key":"6010_CR14","doi-asserted-by":"crossref","unstructured":"Jia Y, Shelhamer E, Donahue J, et al. (2014) Caffe: convolutional architecture for fast feature embedding [C]\/\/. Proc 22nd ACM Int Conf Multimed ACM: 675\u2013678","DOI":"10.1145\/2647868.2654889"},{"key":"6010_CR15","doi-asserted-by":"crossref","unstructured":"Katzenbeisser S, Petitcolas F (2000) Information hiding techniques for steganography and digital watermarking [M]. Artech house","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"6010_CR16","unstructured":"Ker AD, B\u00f6hme R (2008) Revisiting weighted stego-image steganalysis [C]\/\/Electronic Imaging 2008. International Society for Optics and Photonics: 681905\u2013681905-17"},{"key":"6010_CR17","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd J, Fridrich J (2009) Calibration revisited [C]\/\/. Proc 11th ACM Workshop Multimed Sec. ACM: 63\u201374","DOI":"10.1145\/1597817.1597830"},{"issue":"2","key":"6010_CR18","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media [J]. IEEE Trans Inform Forensics Sec 7(2):432\u2013444","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"6010_CR19","unstructured":"Kodovsk\u00fd J, Sedighi V, Fridrich J (2014) Study of cover source mismatch in steganalysis and ways to mitigate its impact [C]\/\/IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics, : 90280J\u201390280J-12"},{"key":"6010_CR20","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.neucom.2016.06.037","volume":"214","author":"X Kong","year":"2016","unstructured":"Kong X, Feng C, Li M, Guo Y (2016) Iterative multi-order feature alignment for JPEG mismatched steganalysis [J]. Neurocomputing 214:458\u2013470","journal-title":"Neurocomputing"},{"key":"6010_CR21","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks [C]\/\/. Adv Neural Inform Process Syst: 1097\u20131105"},{"issue":"7553","key":"6010_CR22","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning [J]. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"key":"6010_CR23","unstructured":"Li X (2014) Research on JPEG images mismatched Steganalysis [D]. Dalian University of Technology"},{"key":"6010_CR24","unstructured":"Li B, Wang M, Huang J, et al. (2014) A new cost function for spatial image steganography [C]\/\/image processing (ICIP), 2014 I.E. international conference on. IEEE: 4206\u20134210"},{"key":"6010_CR25","unstructured":"Lu J (2014) Image Steganalytic feature analysis and Steganographic algorithm recognition [D]. PLA Information Engineering University"},{"key":"6010_CR26","doi-asserted-by":"crossref","unstructured":"Lubenko I, Ker AD (2012) Steganalysis with mismatched covers: do simple classifiers help? [C]\/\/. Proc Multimed Sec. ACM: 11\u201318","DOI":"10.1145\/2361407.2361410"},{"issue":"5","key":"6010_CR27","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited [J]. IEEE signal processing letters 13(5):285\u2013287","journal-title":"IEEE signal processing letters"},{"key":"6010_CR28","unstructured":"Pevny T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis [C]\/\/Electronic Imaging 2007. Int Soc Optics Photonics: 650503\u2013650503-13"},{"issue":"4","key":"6010_CR29","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/TIFS.2008.2002936","volume":"3","author":"T Pevny","year":"2008","unstructured":"Pevny T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format [J]. IEEE Trans Inform Forensics Sec 3(4):635\u2013650","journal-title":"IEEE Trans Inform Forensics Sec"},{"issue":"2","key":"6010_CR30","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Trans Inform Forensics Sec 5(2):215\u2013224","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"6010_CR31","first-page":"161","volume-title":"Using high-dimensional image models to perform highly undetectable steganography [C]\/\/international workshop on information hiding","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography [C]\/\/international workshop on information hiding. Springer, Berlin, Heidelberg, pp 161\u2013177"},{"key":"6010_CR32","unstructured":"Qian Y, Dong J, Wang W, et al. (2015) Deep learning for steganalysis via convolutional neural networks [C]\/\/. SPIE\/IS&T Electronic Imaging. International Society for Optics Photonics: 94090J\u201394090J-10"},{"key":"6010_CR33","doi-asserted-by":"crossref","unstructured":"Qian Y, Dong J, Wang W, et al. (2016) Learning and transferring representations for image steganalysis using convolutional neural network [C]\/\/. Image Process (ICIP), 2016 I.E. Int Conf. IEEE: 2752\u20132756","DOI":"10.1109\/ICIP.2016.7532860"},{"key":"6010_CR34","doi-asserted-by":"crossref","unstructured":"Sedighi V, Fridrich JJ, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model [C]\/\/Media Watermarking, Security, and Forensics: 94090H","DOI":"10.1117\/12.2080272"},{"issue":"2","key":"6010_CR35","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability [J]. IEEE Trans Inform Forensics Sec 11(2):221\u2013234","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"6010_CR36","doi-asserted-by":"crossref","unstructured":"Taigman Y, Yang M, Ranzato M A, et al. (2014) Deepface: Closing the gap to human-level performance in face verification [C]\/\/. Proc IEEE Conf Comput Vision Pattern Recogn: 1701-1708","DOI":"10.1109\/CVPR.2014.220"},{"key":"6010_CR37","doi-asserted-by":"crossref","unstructured":"Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images [C]\/\/. Asia-Pacific signal and information processing association, 2014 annual summit and conference (APSIPA). IEEE: 1\u20134","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"6010_CR38","doi-asserted-by":"crossref","unstructured":"Wang P, Liu F, Wang G, et al. (2008) Multi-class steganalysis for Jpeg stego algorithms [C]\/\/. Image Process, 2008. ICIP 2008. 15th IEEE International Conference on. IEEE: 2076\u20132079","DOI":"10.1109\/ICIP.2008.4712195"},{"issue":"5","key":"6010_CR39","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis [J]. IEEE Sign Process Lett 23(5):708\u2013712","journal-title":"IEEE Sign Process Lett"},{"key":"6010_CR40","doi-asserted-by":"crossref","unstructured":"Xu G, Wu HZ, Shi YQ (2016) Ensemble of CNNs for steganalysis: an empirical study [C]\/\/. Proc 4th ACM Workshop Inform Hiding Multimed Sec. ACM: 103\u2013107","DOI":"10.1145\/2909827.2930798"},{"key":"6010_CR41","first-page":"564","volume-title":"Deep learning on spatial rich model for Steganalysis [C]\/\/international workshop on digital watermarking","author":"X Xu","year":"2016","unstructured":"Xu X, Sun Y, Tang G et al (2016) Deep learning on spatial rich model for Steganalysis [C]\/\/international workshop on digital watermarking. Springer, Cham, pp 564\u2013577"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6010-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6010-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6010-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T10:21:16Z","timestamp":1589883676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6010-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,25]]},"references-count":41,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["6010"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6010-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,25]]},"assertion":[{"value":"19 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}