{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:32:40Z","timestamp":1774992760184,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"27-28","license":[{"start":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T00:00:00Z","timestamp":1585612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T00:00:00Z","timestamp":1585612800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973103, 61751304, 61603366"],"award-info":[{"award-number":["61973103, 61751304, 61603366"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Henan province Central plains thousand talents plan: top young talents"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11042-020-08831-8","type":"journal-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T15:38:22Z","timestamp":1585669102000},"page":"19875-19892","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Steganalysis framework based on CNN using the filter subset selection method"],"prefix":"10.1007","volume":"79","author":[{"given":"Lan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiaolei","family":"Han","sequence":"additional","affiliation":[]},{"given":"Chenglin","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Binquan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,31]]},"reference":[{"issue":"3","key":"8831_CR1","doi-asserted-by":"publisher","first-page":"131","DOI":"10.12677\/JISP.2017.63016","volume":"6","author":"J Dong","year":"2017","unstructured":"Dong J, Qian Y, Wang W (2017) Recent advances in image Steganalysis. Journal of Image and Signal Processing 6(3):131\u2013138","journal-title":"Journal of Image and Signal Processing"},{"key":"8831_CR2","doi-asserted-by":"crossref","unstructured":"Feng G, Zhang X, Ren Y (2019) Diversity-based Cascade filters for JPEG Steganalysis. IEEE Transactions on Circuits Systems for Video Technology","DOI":"10.1109\/TCSVT.2019.2891778"},{"issue":"4","key":"8831_CR3","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","volume":"5","author":"T Filler","year":"2010","unstructured":"Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Transactions on Information Forensics 5(4):705\u2013720","journal-title":"IEEE Transactions on Information Forensics"},{"issue":"3","key":"8831_CR4","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for Steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868\u2013882","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8831_CR5","doi-asserted-by":"crossref","unstructured":"Goljan M, Fridrich J, Cogranne R (2015) Rich model for Steganalysis of color images. IEEE International Workshop on Information Forensics & Security","DOI":"10.1109\/WIFS.2014.7084325"},{"issue":"15","key":"8831_CR6","doi-asserted-by":"publisher","first-page":"21113","DOI":"10.1007\/s11042-019-7168-5","volume":"78","author":"JB Guttikonda","year":"2019","unstructured":"Guttikonda JB, Sridevi R (2019) A new steganalysis approach with an efficient feature selection and classification algorithms for identifying the stego images. Multimedia Tools Applications 78(15):21113\u201321131","journal-title":"Multimedia Tools Applications"},{"issue":"7","key":"8831_CR7","first-page":"1737","volume":"31","author":"I Guyon","year":"2006","unstructured":"Guyon I, Elisseeff A, Jankowski N (2006) Feature extraction. Of Studies in Fuzziness Soft Computing 31(7):1737\u20131744","journal-title":"Of Studies in Fuzziness Soft Computing"},{"key":"8831_CR8","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing Steganographic distortion using directional filters. IEEE International Workshop on Information Forensics and Security.","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"12","key":"8831_CR9","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub V, Fridrich J (2013) Random projections of residuals for digital image Steganalysis. IEEE Transactions on Information Forensics & Security 8(12):1996\u20132006","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"8831_CR10","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. Eurasip Journal on Information Security","DOI":"10.1186\/1687-417X-2014-1"},{"issue":"2","key":"8831_CR11","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd J, Fridrich J, Holub V (2012) Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security 7(2):432\u2013444","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"8831_CR12","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1109\/TIFS.2017.2780805","volume":"13","author":"B Li","year":"2018","unstructured":"Li B, Li Z, Zhou S (2018) New Steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator. IEEE Transactions on Information Forensics and Security 13(5):1242\u20131257","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8831_CR13","unstructured":"Qian Y, Dong J, Wang W (2015) Deep learning for steganalysis via convolutional neural networks. Media Watermarking, Security, and Forensics 2015"},{"issue":"11","key":"8831_CR14","doi-asserted-by":"publisher","first-page":"3217","DOI":"10.1109\/78.875477","volume":"48","author":"D Sebald","year":"2000","unstructured":"Sebald D, Bucklew J (2000) Support vector machine techniques for nonlinear equalization. IEEE Trans Signal Process 48(11):3217\u20133226","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"8831_CR15","first-page":"309","volume":"36","author":"X Shi","year":"2018","unstructured":"Shi X, Li B, Tan S (2018) Preprocessing layer in spatial Steganalysis based on deep learning. Journal of Applied Sciences-Electronics and Information Engineering 36(2):309\u2013320","journal-title":"Journal of Applied Sciences-Electronics and Information Engineering"},{"issue":"5","key":"8831_CR16","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu H, Shi Y (2016) Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Processing Letters 23(5):708\u2013712","journal-title":"IEEE Signal Processing Letters"},{"issue":"12","key":"8831_CR17","first-page":"1205","volume":"5","author":"L Yu","year":"2004","unstructured":"Yu L, Liu H (2004) Eficient feature selection via analysis of relevance and redundancy. J Mach Learn Res 5(12):1205\u20131224","journal-title":"J Mach Learn Res"},{"key":"8831_CR18","doi-asserted-by":"crossref","unstructured":"Yuan Y, Wei L, Feng B (2017) Steganalysis with CNN using multi-channels filtered residuals. 3rd international conference on cloud computing and security (ICCCS 2017):110-120","DOI":"10.1007\/978-3-319-68505-2_10"},{"issue":"4","key":"8831_CR19","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"W Zhou","year":"2004","unstructured":"Zhou W, Alan Conrad B, Hamid Rahim S (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08831-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-08831-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08831-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T02:54:01Z","timestamp":1666234441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-08831-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,31]]},"references-count":19,"journal-issue":{"issue":"27-28","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["8831"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08831-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,31]]},"assertion":[{"value":"4 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}