{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T21:00:05Z","timestamp":1766350805727,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T00:00:00Z","timestamp":1600646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T00:00:00Z","timestamp":1600646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972390","U1636102"],"award-info":[{"award-number":["61972390","U1636102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736214"],"award-info":[{"award-number":["U1736214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Technology R&D Program","award":["2019QY0700"],"award-info":[{"award-number":["2019QY0700"]}]},{"name":"National Key Technology R&D Program","award":["2016QY15Z2500","2016YFB0801003"],"award-info":[{"award-number":["2016QY15Z2500","2016YFB0801003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09350-2","type":"journal-article","created":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T11:02:32Z","timestamp":1600686152000},"page":"3349-3366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["JPEG steganalysis based on ResNeXt with Gauss partial derivative filters"],"prefix":"10.1007","volume":"80","author":[{"given":"Ante","family":"Su","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5770-7192","authenticated-orcid":false,"given":"Xiaolei","family":"He","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,21]]},"reference":[{"key":"9350_CR1","doi-asserted-by":"crossref","unstructured":"Bas P (2011) \u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS. In: International conference on information hiding, pp 59\u201370","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"9350_CR2","unstructured":"Bas P, Furon T (2007) Bows-2: break our watermarking system. http:\/\/bows2.gipsa-lab.inpg.fr Accessed Jul 2007"},{"issue":"5","key":"9350_CR3","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"Boroumand M, Chen M, Fridrich JJ (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14(5):1181\u20131193","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9350_CR4","doi-asserted-by":"crossref","unstructured":"Chen M, Sedighi V, Boroumand M, Fridrich JJ (2017) Jpeg-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, IH&MMSec 2017, Philadelphia, June 20\u201322, 2017, pp 75\u201384","DOI":"10.1145\/3082031.3083248"},{"key":"9350_CR5","volume-title":"Digital watermarking and steganography","author":"I Cox","year":"2007","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Francisco"},{"key":"9350_CR6","doi-asserted-by":"crossref","unstructured":"Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: IEEE international workshop on information forensics and security, pp 48\u201353","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"8","key":"9350_CR7","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1109\/TIFS.2016.2555281","volume":"11","author":"TD Denemark","year":"2016","unstructured":"Denemark TD, Boroumand M, Fridrich J (2016) Steganalysis features for content-adaptive JPEG steganography. IEEE Trans Inf Forensics Secur 11(8):1736\u20131746","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"9350_CR8","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9350_CR9","unstructured":"Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp 249\u2013256"},{"key":"9350_CR10","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition, CVPR 2016, Las Vegas, June 27\u201330, 2016, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"2","key":"9350_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219\u2013228","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9350_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich JJ, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 2014:1","journal-title":"EURASIP J Inf Secur"},{"issue":"2","key":"9350_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd J, Fridrich JJ, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9350_CR14","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems 25: 26th annual conference on neural information processing systems 2012. Proceedings of a meeting held December 3\u20136, 2012, Lake Tahoe, pp 1106\u20131114"},{"issue":"11","key":"9350_CR15","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P, et al. (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"9350_CR16","first-page":"94090J","volume":"9409","author":"Y Qian","year":"2015","unstructured":"Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. Proc SPIE\u2014Int Soc Opt Eng 9409:94090J\u201394090J\u201310","journal-title":"Proc SPIE\u2014Int Soc Opt Eng"},{"key":"9350_CR17","doi-asserted-by":"crossref","unstructured":"Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE international conference on image processing, ICIP 2016, Phoenix, September 25\u201328, 2016, pp 2752\u20132756","DOI":"10.1109\/ICIP.2016.7532860"},{"key":"9350_CR18","doi-asserted-by":"crossref","unstructured":"Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: ACM workshop on information hiding and multimedia security, pp 15\u201323","DOI":"10.1145\/2756601.2756608"},{"key":"9350_CR19","doi-asserted-by":"crossref","unstructured":"Xie S, Girshick RB, Doll\u00e1r P, Tu Z, He K (2017) Aggregated residual transformations for deep neural networks. In: 2017 IEEE conference on computer vision and pattern recognition, CVPR 2017, Honolulu, July 21\u201326, 2017, pp 5987\u20135995","DOI":"10.1109\/CVPR.2017.634"},{"key":"9350_CR20","doi-asserted-by":"crossref","unstructured":"Xu G (2017) Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, IH&MMSec 2017, Philadelphia, June 20\u201322, 2017, pp 67\u201373","DOI":"10.1145\/3082031.3083236"},{"key":"9350_CR21","doi-asserted-by":"crossref","unstructured":"Xu G, Wu H, Shi YQ (2016) Ensemble of CNNs for steganalysis: An empirical study. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security, IH&MMSec 2016, Vigo, Galicia, June 20\u201322, 2016, pp 103\u2013107","DOI":"10.1145\/2909827.2930798"},{"issue":"5","key":"9350_CR22","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708\u2013712","journal-title":"IEEE Signal Process Lett"},{"issue":"11","key":"9350_CR23","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12(11):2545\u20132557","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9350_CR24","doi-asserted-by":"crossref","unstructured":"Yedroudj M, Comby F, Chaumont M (2018) Yedroudj-net: an efficient CNN for spatial steganalysis. In: 2018 IEEE international conference on acoustics, speech and signal processing, ICASSP 2018, Calgary, April 15\u201320, 2018, pp 2092\u20132096","DOI":"10.1109\/ICASSP.2018.8461438"},{"issue":"5","key":"9350_CR25","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TIFS.2017.2779446","volume":"13","author":"J Zeng","year":"2018","unstructured":"Zeng J, Tan S, Li B, Huang J (2018) Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans Inf Forensics and Secur 13(5):1200\u20131214","journal-title":"IEEE Trans Inf Forensics and Secur"},{"issue":"1","key":"9350_CR26","doi-asserted-by":"publisher","first-page":"13011","DOI":"10.1117\/1.JEI.26.1.013011","volume":"26","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Liu F, Yang C, Luo X, Song X, Lu J (2017) Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank. J Electron Imaging 26(1):13011","journal-title":"J Electron Imaging"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09350-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09350-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09350-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T02:12:00Z","timestamp":1632190320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09350-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,21]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9350"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09350-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,9,21]]},"assertion":[{"value":"6 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}