{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T05:37:15Z","timestamp":1769578635368,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T00:00:00Z","timestamp":1565049600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T00:00:00Z","timestamp":1565049600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636102"],"award-info":[{"award-number":["U1636102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736214"],"award-info":[{"award-number":["U1736214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802393"],"award-info":[{"award-number":["61802393"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Technology R&D Program","award":["2016YFB0801003"],"award-info":[{"award-number":["2016YFB0801003"]}]},{"name":"National Key Technology R&D Program","award":["2016QY15Z2500"],"award-info":[{"award-number":["2016QY15Z2500"]}]},{"name":"National Key Technology R&D Program","award":["2017YFC0822704"],"award-info":[{"award-number":["2017YFC0822704"]}]},{"name":"Beijing Municipal Science & Technology Commission","award":["Z181100002718001"],"award-info":[{"award-number":["Z181100002718001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11042-019-07994-3","type":"journal-article","created":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T11:02:25Z","timestamp":1565089345000},"page":"32503-32522","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Adaptive spatial steganography based on adversarial examples"],"prefix":"10.1007","volume":"78","author":[{"given":"Sai","family":"Ma","sequence":"first","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yaqi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,6]]},"reference":[{"key":"7994_CR1","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2013) Efficient high-capacity steganography technique. In: Proc. SPIE Electronic imaging security forensics steganography and watermarking of multimedia contents","DOI":"10.1117\/12.2018994"},{"key":"7994_CR2","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl, 1\u201325","DOI":"10.1007\/s11042-019-7166-7"},{"issue":"5","key":"7994_CR3","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensic Secur 14(5):1181\u20131193","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7994_CR4","doi-asserted-by":"crossref","unstructured":"Chen M, Sedighi V, Boroumand M (2017) JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security. ACM, pp 75\u201384","DOI":"10.1145\/3082031.3083248"},{"key":"7994_CR5","doi-asserted-by":"crossref","unstructured":"Denemark T, Fridrich J (2015) Improving steganographic security by synchronizing the selection channel. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security. ACM, pp 5\u201314","DOI":"10.1145\/2756601.2756620"},{"key":"7994_CR6","doi-asserted-by":"crossref","unstructured":"Denemark T, Fridrich J (2015) Side-informed steganography with additive distortion. In: 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1\u20136","DOI":"10.1109\/WIFS.2015.7368589"},{"issue":"10","key":"7994_CR7","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.1109\/TIFS.2017.2705625","volume":"12","author":"T Denemark","year":"2017","unstructured":"Denemark T, Fridrich J (2017) Steganography with multiple jpeg images of the same scene. IEEE Trans Inf Forensic Secur 12(10):2308\u20132319","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7994_CR8","doi-asserted-by":"crossref","unstructured":"Denemark T, Fridrich J (2017) Steganography with two jpegs of the same scene. In: ICASSP, pp 2117\u20132121","DOI":"10.1109\/ICASSP.2017.7952530"},{"issue":"3","key":"7994_CR9","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6(3):920\u2013935","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"7994_CR10","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7994_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich J, Kodovsky J (2013) Multivariate gaussian model for designing additive distortion for steganography. In: ICASSP, pp 2949\u20132953","DOI":"10.1109\/ICASSP.2013.6638198"},{"key":"7994_CR12","unstructured":"Goodfellow I, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:\n1412.6572"},{"key":"7994_CR13","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 234\u2013239","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"1","key":"7994_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 2014(1):1\u201313","journal-title":"EURASIP J Inf Secur"},{"issue":"8","key":"7994_CR15","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1109\/TIFS.2014.2326954","volume":"9","author":"B Li","year":"2014","unstructured":"Li B, Tan S, Wang M, Huang J (2014) Investigation on cost assignment in spatial image steganography. IEEE Trans Inf Forensic Secur 9(8):1264\u20131277","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7994_CR16","doi-asserted-by":"crossref","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE international conference on image processing (ICIP). IEEE, pp 4206\u20134210","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"9","key":"7994_CR17","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"B Li","year":"2015","unstructured":"Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensic Secur 10(9):1905\u20131917","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7994_CR18","doi-asserted-by":"crossref","unstructured":"Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Information hiding. Springer, pp 161\u2013177","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"7994_CR19","doi-asserted-by":"publisher","unstructured":"Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. SPIE Media Watermarking, Security, and Forensics, vol 9409. \nhttps:\/\/doi.org\/10.1117\/12.2083479","DOI":"10.1117\/12.2083479"},{"issue":"2","key":"7994_CR20","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Secur 11(2):221\u2013234","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7994_CR21","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv:\n1312.6199"},{"key":"7994_CR22","doi-asserted-by":"crossref","unstructured":"Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. Paper presented at the Asia-Pacific Signal and Information Processing Association 2014, Annual Summit and Conference (APSIPA)","DOI":"10.1109\/APSIPA.2014.7041565"},{"issue":"10","key":"7994_CR23","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24 (10):1547\u20131551","journal-title":"IEEE Signal Process Lett"},{"key":"7994_CR24","doi-asserted-by":"publisher","unstructured":"Tang W, Li B, Tan S, Barni M, Huang J (2019) Cnn-based adversarial embedding for image steganography. IEEE Trans Inf Forensic Secur, 1\u20131. \nhttps:\/\/doi.org\/10.1109\/TIFS.2019.2891237","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"7994_CR25","unstructured":"Volkhonskiy D, Nazarov I, Borisenko B, Burnaev E (2017) Steganographic generative adversarial networks. arXiv:\n1703.05502"},{"key":"7994_CR26","doi-asserted-by":"crossref","unstructured":"Xu G (2017) Deep convolutional neural network to detect j-uniward. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security. ACM, pp 67\u201373","DOI":"10.1145\/3082031.3083236"},{"issue":"5","key":"7994_CR27","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu H, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708\u2013712","journal-title":"IEEE Signal Process Lett"},{"issue":"11","key":"7994_CR28","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensic Secur 12(11):2545\u20132557","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7994_CR29","doi-asserted-by":"crossref","unstructured":"Yedroudj M, Comby F, Chaumont M (2018) Yedroudj-net: an efficient cnn for spatial steganalysis. In: ICASSP, pp 2092\u20132096","DOI":"10.1109\/ICASSP.2018.8461438"},{"issue":"10","key":"7994_CR30","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TCSVT.2016.2587388","volume":"27","author":"W Zhang","year":"2017","unstructured":"Zhang W, Zhang Z, Zhang L, Li H, Yu N (2017) Decomposing joint distortion for adaptive steganography. IEEE Trans Circ Syst Video Technol 27 (10):2274\u20132280","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"7994_CR31","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhang W, Chen K, Liu J, Liu Y, Yu N (2018) Adversarial examples against deep neural network based steganalysis. In: Proceedings of the 6th ACM workshop on information hiding and multimedia security. ACM, pp 67\u201372","DOI":"10.1145\/3206004.3206012"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07994-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-07994-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07994-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T23:17:25Z","timestamp":1596583045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-07994-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,6]]},"references-count":31,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["7994"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-07994-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,6]]},"assertion":[{"value":"8 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}