{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T02:55:50Z","timestamp":1712199350359},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T00:00:00Z","timestamp":1555977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-019-7601-9","type":"journal-article","created":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T02:02:27Z","timestamp":1555984947000},"page":"22711-22725","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["RestegNet: a residual steganalytic network"],"prefix":"10.1007","volume":"78","author":[{"given":"Weike","family":"You","sequence":"first","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Sai","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yaqi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,23]]},"reference":[{"key":"7601_CR1","doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevn\u00fd T (2011) \u201cbreak our steganographic system\u201d: the ins and outs of organizing BOSS. In: Information hiding - 13th international conference, IH 2011, prague, Czech Republic, May 18-20, 2011, revised selected papers. Springer, pp 59\u201370","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"7601_CR2","doi-asserted-by":"crossref","unstructured":"Chen M, Sedighi V, Boroumand M, Fridrich JJ (2017) Jpeg-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, IH&MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017. ACM, pp 75\u201384","DOI":"10.1145\/3082031.3083248"},{"key":"7601_CR3","doi-asserted-by":"crossref","unstructured":"Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich JJ (2014) Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International workshop on information forensics and security, WIFS 2014, Atlanta, GA, USA, December 3-5, 2014, pp 48\u201353","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"3","key":"7601_CR4","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"JJ Fridrich","year":"2012","unstructured":"Fridrich JJ, Kodovsk\u00fd J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7601_CR5","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"1","key":"7601_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich JJ, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 2014(1):1","journal-title":"EURASIP J Inf Secur"},{"key":"7601_CR7","unstructured":"Huang G, Liu Z, Weinberger KQ (2016) Densely connected convolutional networks. CoRR arXiv:\n                    1608.06993"},{"issue":"99","key":"7601_CR8","first-page":"1","volume":"PP","author":"B Li","year":"2018","unstructured":"Li B, Wei W, Ferreira A, Tan S (2018) Rest-net: Diverse activation modules and parallel sub-nets based cnn for spatial image steganalysis. IEEE Signal Process Lett PP(99):1\u20131","journal-title":"IEEE Signal Process Lett"},{"key":"7601_CR9","doi-asserted-by":"crossref","unstructured":"Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Proceedings of the international society for optics and photonics, media watermarking, security, and forensics 2015, San Francisco, CA, USA, February 9-11, 2015, p 94090J","DOI":"10.1117\/12.2083479"},{"key":"7601_CR10","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed SE, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: IEEE conference on computer vision and pattern recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015, pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"7601_CR11","doi-asserted-by":"crossref","unstructured":"Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. In: Asia-pacific signal and information processing association annual summit and conference, APSIPA 2014, Chiang Mai, Thailand, December 9-12, 2014. IEEE, pp 1\u20134","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"7601_CR12","doi-asserted-by":"crossref","unstructured":"Tang W, Li H, Luo W, Huang J (2014) Adaptive steganalysis against WOW embedding algorithm. In: ACM information hiding and multimedia security workshop, IH & MMSec \u201914, Salzburg, Austria, June 11-13, 2014, pp 91\u201396","DOI":"10.1145\/2600918.2600935"},{"key":"7601_CR13","doi-asserted-by":"crossref","unstructured":"Xu G (2017) Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, IH&MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017. ACM, pp 67\u201373","DOI":"10.1145\/3082031.3083236"},{"issue":"5","key":"7601_CR14","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu H, Shi Y (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708\u2013712","journal-title":"IEEE Signal Process Lett"},{"key":"7601_CR15","doi-asserted-by":"crossref","unstructured":"Xu G, Wu H, Shi Y (2016) Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security, IH&MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016. ACM, pp 103\u2013107","DOI":"10.1145\/2909827.2930798"},{"issue":"11","key":"7601_CR16","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensic Secur 12(11):2545\u20132557","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"7601_CR17","unstructured":"Yedroudj M, Comby F, Chaumont M (2018) Yedrouj-net: an efficient CNN for spatial steganalysis. CoRR arXiv:\n                    1803.00407"},{"issue":"4","key":"7601_CR18","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimedia Tools Appl 77(4):4585\u20134608. \n                    https:\/\/doi.org\/10.1007\/s11042-017-4637-6","journal-title":"Multimedia Tools Appl"},{"key":"7601_CR19","unstructured":"Zhang R, Zhu F, Liu J, Liu G (2018) Efficient feature learning and multi-size image steganalysis based on CNN. CoRR arXiv:\n                    1807.11428"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7601-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T23:10:30Z","timestamp":1587510630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7601-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,23]]},"references-count":19,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7601"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7601-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,23]]},"assertion":[{"value":"4 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}