{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:17:15Z","timestamp":1768681035865,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Human Resource Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09960-w","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T16:03:01Z","timestamp":1601654581000},"page":"4903-4917","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Steganalysis using learned denoising kernels"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2661-6244","authenticated-orcid":false,"given":"Brijesh","family":"Singh","sequence":"first","affiliation":[]},{"given":"Mohit","family":"Chhajed","sequence":"additional","affiliation":[]},{"given":"Arijit","family":"Sur","sequence":"additional","affiliation":[]},{"given":"Pinaki","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"9960_CR1","unstructured":"Abadi M, Barham P, Chen J, et al. (2016) Tensorflow: a system for large-scale machine learning. In: 12Th {USENIX} symposium on operating systems design and implementation ({OSDI} 16), pp 265\u2013283"},{"key":"9960_CR2","doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevny\u0300 T (2011) \u201cbreak our steganographic system\u201d: the ins and outs of organizing boss. In: International workshop on information hiding, Springer, pp 59\u201370","DOI":"10.1007\/978-3-642-24178-9_5"},{"issue":"5","key":"9960_CR3","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2018","unstructured":"Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inform Forensics and Security 14(5):1181\u20131193","journal-title":"IEEE Trans Inform Forensics and Security"},{"issue":"1","key":"9960_CR4","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10479-005-5724-z","volume":"134","author":"PT De Boer","year":"2005","unstructured":"De Boer PT, Kroese DP, Mannor S, Rubinstein RY (2005) A tutorial on the cross-entropy method. Ann Oper Res 134(1):19\u201367","journal-title":"Ann Oper Res"},{"key":"9960_CR5","doi-asserted-by":"crossref","unstructured":"Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International workshop on information forensics and security (WIFS), IEEE, pp 48\u201353","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"Jul","key":"9960_CR6","first-page":"2121","volume":"12","author":"J Duchi","year":"2011","unstructured":"Duchi J, Hazan E, Singer Y (2011) Adaptive subgradient methods for online learning and stochastic optimization. J Mach Learn Res 12(Jul):2121\u20132159","journal-title":"J Mach Learn Res"},{"key":"9960_CR7","unstructured":"Fridrich J (2012) Digital data embedding laboratory. http:\/\/dde.binghamton.edu\/download\/"},{"issue":"3","key":"9960_CR8","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forensics and Security 7(3):868\u2013882","journal-title":"IEEE Trans Inform Forensics and Security"},{"key":"9960_CR9","doi-asserted-by":"crossref","unstructured":"Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In: Security, steganography, and watermarking of multimedia contents VIII, vol 6072. International Society for Optics and Photonics, p 607201","DOI":"10.1117\/12.643254"},{"key":"9960_CR10","doi-asserted-by":"crossref","unstructured":"Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (hugo). In: International workshop on information hiding, Springer, pp 71\u201384","DOI":"10.1007\/978-3-642-24178-9_6"},{"key":"9960_CR11","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"9960_CR12","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS), IEEE, pp 234\u2013239","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"12","key":"9960_CR13","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8 (12):1996\u20132006","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"9960_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inform Security 2014 (1):1","journal-title":"EURASIP J Inform Security"},{"key":"9960_CR15","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization:, Accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167"},{"issue":"2","key":"9960_CR16","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2011","unstructured":"Kodovsky J, Fridrich J, Holub V (2011) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensics and Security 7(2):432\u2013444","journal-title":"IEEE Trans Inform Forensics and Security"},{"key":"9960_CR17","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"key":"9960_CR18","doi-asserted-by":"crossref","unstructured":"LeCun Y, Kavukcuoglu K, Farabet C (2010) Convolutional networks and applications in vision. In: Proceedings of 2010 IEEE international symposium on circuits and systems, IEEE, pp 253\u2013256","DOI":"10.1109\/ISCAS.2010.5537907"},{"key":"9960_CR19","doi-asserted-by":"crossref","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International conference on image processing (ICIP), IEEE, pp 4206\u20134210","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"5","key":"9960_CR20","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1109\/LSP.2018.2816569","volume":"25","author":"B Li","year":"2018","unstructured":"Li B, Wei W, Ferreira A, Tan S (2018) Rest-net: Diverse activation modules and parallel subnets-based cnn for spatial image steganalysis. IEEE Signal Process Lett 25(5):650\u2013654","journal-title":"IEEE Signal Process Lett"},{"issue":"3","key":"9960_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3397179","volume":"16","author":"Y Li","year":"2020","unstructured":"Li Y, Hu H, Zhu Z, Zhou G (2020) Scanet: Sensor-based continuous authentication with two-stream convolutional neural networks. ACM Trans Sensor Networks (TOSN) 16(3):1\u201327","journal-title":"ACM Trans Sensor Networks (TOSN)"},{"key":"9960_CR22","doi-asserted-by":"crossref","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing, pp 1\u20131","DOI":"10.1109\/TDSC.2020.3004708"},{"issue":"3","key":"9960_CR23","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Vid Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"9960_CR24","doi-asserted-by":"crossref","unstructured":"Lyu S, Farid H (2002) Detecting hidden messages using higher-order statistics and support vector machines. In: International workshop on information hiding, Springer, pp 340\u2013354","DOI":"10.1007\/3-540-36415-3_22"},{"key":"9960_CR25","unstructured":"Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th international conference on machine learning (ICML-10), pp 807\u2013814"},{"key":"9960_CR26","unstructured":"Patrick Bas TF (2007) Bows-2. http:\/\/bows2.ec-lille.fr\/"},{"issue":"2","key":"9960_CR27","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inform Forensics and Security 5(2):215\u2013224","journal-title":"IEEE Trans Inform Forensics and Security"},{"key":"9960_CR28","doi-asserted-by":"crossref","unstructured":"Pevny\u0300 T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding, Springer, pp 161\u2013177","DOI":"10.1007\/978-3-642-16435-4_13"},{"issue":"3","key":"9960_CR29","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security & Privacy 1(3):32\u201344","journal-title":"IEEE Security & Privacy"},{"key":"9960_CR30","doi-asserted-by":"crossref","unstructured":"Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Media watermarking, security, and forensics 2015, vol 9409, International society for optics and photonics, pp 94090j","DOI":"10.1117\/12.2083479"},{"key":"9960_CR31","doi-asserted-by":"crossref","unstructured":"Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International conference on image processing (ICIP), IEEE, pp 2752\u20132756","DOI":"10.1109\/ICIP.2016.7532860"},{"key":"9960_CR32","doi-asserted-by":"crossref","unstructured":"Rabevohitra FH, Li Y (2019) Text cover steganography using font color of the invisible characters and optimized primary color-intensities. In: 2019 IEEE 19Th international conference on communication technology (ICCT), IEEE, pp 1704\u20131708","DOI":"10.1109\/ICCT46805.2019.8947188"},{"issue":"17","key":"9960_CR33","doi-asserted-by":"publisher","first-page":"7063","DOI":"10.1007\/s11042-014-1952-z","volume":"74","author":"MM Sadek","year":"2015","unstructured":"Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimedia Tools and Applications 74 (17):7063\u20137094","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"9960_CR34","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2015","unstructured":"Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forensics and Security 11(2):221\u2013234","journal-title":"IEEE Trans Inform Forensics and Security"},{"key":"9960_CR35","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556"},{"issue":"1","key":"9960_CR36","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929\u20131958","journal-title":"J Mach Learn Res"},{"key":"9960_CR37","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi A (2016) Inception-v4, inception-resnet and the impact of residual connections on learning. arXiv:1602.07261"},{"key":"9960_CR38","doi-asserted-by":"crossref","unstructured":"Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and information processing association annual summit and conference (APSIPA), 2014 asia-pacific, IEEE, pp 1\u20134","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"9960_CR39","first-page":"1758","volume":"12","author":"Yb Tong","year":"2006","unstructured":"Tong Yb, Zhang QS, QI YP (2006) Image quality assessing by combining psnr with ssim. Journal of Image and Graphics 12:1758\u20131763","journal-title":"Journal of Image and Graphics"},{"issue":"5","key":"9960_CR40","doi-asserted-by":"publisher","first-page":"2897","DOI":"10.1007\/s11042-015-2521-9","volume":"75","author":"P Wang","year":"2016","unstructured":"Wang P, Wei Z, Xiao L (2016) Pure spatial rich model features for digital image steganalysis. Multimedia Tools and Applications 75(5):2897\u20132912","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"9960_CR41","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z Wang","year":"2009","unstructured":"Wang Z, Bovik AC (2009) Mean squared error: Love it or leave it? a new look at signal fidelity measures. IEEE Signal process Magazine 26(1):98\u2013117","journal-title":"IEEE Signal process Magazine"},{"issue":"4","key":"9960_CR42","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image process 13(4):600\u2013612","journal-title":"IEEE Trans Image process"},{"issue":"5","key":"9960_CR43","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708\u2013712","journal-title":"IEEE Signal Process Lett"},{"issue":"11","key":"9960_CR44","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forensics and Security 12(11):2545\u20132557","journal-title":"IEEE Trans Inform Forensics and Security"},{"issue":"3","key":"9960_CR45","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCI.2018.2840738","volume":"13","author":"T Young","year":"2018","unstructured":"Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. IEEE Comput Intel Magazine 13(3):55\u201375","journal-title":"IEEE Comput Intel Magazine"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09960-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09960-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09960-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T01:10:36Z","timestamp":1633137036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09960-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,2]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9960"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09960-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,2]]},"assertion":[{"value":"15 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}