{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:05:13Z","timestamp":1774721113938,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:00:00Z","timestamp":1643068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:00:00Z","timestamp":1643068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872384"],"award-info":[{"award-number":["61872384"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11042-021-11862-4","type":"journal-article","created":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T14:03:00Z","timestamp":1643119380000},"page":"19471-19490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Image steganalysis based on attention augmented convolution"],"prefix":"10.1007","volume":"81","author":[{"given":"Siyuan","family":"Huang","sequence":"first","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Xinliang","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,25]]},"reference":[{"key":"11862_CR1","unstructured":"Bas P, Furon T (2007) BOWS-2. http:\/\/bows2.ec-lille.fr Accessed 10 Jul 2007"},{"key":"11862_CR2","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Proceedings of 13th International Conference on Information Hiding, IH\u20192011. LNCS","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevny T (2011) Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of 13th International Conference on Information Hiding, IH\u20192011. LNCS. Springer, Heidelberg, pp 59\u201370"},{"key":"11862_CR3","doi-asserted-by":"crossref","unstructured":"Bello I, Zoph B, Le Q, Vaswani A, Shlens J (2019) Attention augmented convolutional networks. arxiv:1904.09925","DOI":"10.1109\/ICCV.2019.00338"},{"issue":"5","key":"11862_CR4","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensic Secur 14(5):1181\u20131193","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"11862_CR5","doi-asserted-by":"crossref","unstructured":"Chen M, Sedighi V, Boroumand M, Fridrich J (2017) Jpeg-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, IH&MMSec 2017, Philadelphia, June 20\u201322, 2017, pp 75\u201384","DOI":"10.1145\/3082031.3083248"},{"key":"11862_CR6","doi-asserted-by":"publisher","first-page":"551","DOI":"10.18653\/v1\/D16-1053","volume-title":"Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing","author":"J Cheng","year":"2016","unstructured":"Cheng J, Dong L, Lapata M (2016) Long short-term memory-networks for machine reading. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing. ACL Press, Stroudsburg, pp 551\u2013561"},{"key":"11862_CR7","doi-asserted-by":"publisher","first-page":"5723","DOI":"10.1007\/s11042-020-09929-9","volume":"80","author":"M Dalal","year":"2020","unstructured":"Dalal M, Juneja M (2020) Steganography and Steganalysis (in digital forensics): a cybersecurity guide. Multimed Tools Appl 80:5723\u20135771","journal-title":"Multimed Tools Appl"},{"key":"11862_CR8","doi-asserted-by":"crossref","unstructured":"Denemark T, Sedighi V , Holub V , Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information forensics and security (WIFS), pp 48\u201353","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"8","key":"11862_CR9","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1109\/TIFS.2016.2555281","volume":"11","author":"T Denemark","year":"2016","unstructured":"Denemark T, Boroumand M, Fridrich J (2016) Steganalysis features for content-adaptive JPEG steganography. IEEE Trans Inf Forensic Secur 11(8):1736\u20131746","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"11862_CR10","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"5","key":"11862_CR11","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensic Secur 9(5):814\u2013825","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"12","key":"11862_CR12","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","volume":"10","author":"L Guo","year":"2015","unstructured":"Guo L, Ni J, Su W (2015) Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans Inf Forensic Secur 10(12):2669\u20132680","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"15","key":"11862_CR13","doi-asserted-by":"publisher","first-page":"21113","DOI":"10.1007\/s11042-019-7168-5","volume":"78","author":"J Guttikonda","year":"2019","unstructured":"Guttikonda J, Sridevi R (2019) A new steganalysis approach with an efficient feature selection and classification algorithms for identifying the stego images. Multimed Tools Appl 78(15):21113\u201321131","journal-title":"Multimed Tools Appl"},{"key":"11862_CR14","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","DOI":"10.1109\/CVPR.2016.90"},{"key":"11862_CR15","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Fourth IEEE International Workshop on Information Forensics and Security","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"11862_CR16","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensic Secur 10:219\u2013228","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"11862_CR17","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for stegangography in an arbitrary domain. EURASIP J Inf Secur (1):1\u201313","DOI":"10.1186\/1687-417X-2014-1"},{"issue":"4","key":"11862_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1353-4858(17)30033-8","volume":"2017","author":"D Hu","year":"2017","unstructured":"Hu D, Shen Q, Zhou S, Liu X, Fan Y, Wang L (2017) Adaptive steganalysis based on selection region and combined convolutional neural networks. Sec Commun Netw 2017(4):1\u20139","journal-title":"Sec Commun Netw"},{"key":"11862_CR19","doi-asserted-by":"publisher","first-page":"25924","DOI":"10.1109\/ACCESS.2019.2900076","volume":"7","author":"D Hu","year":"2019","unstructured":"Hu D, Zhou S, Shen Q, Zheng S, Zhao Z, Fan Y (2019) Digital image steganalysis based on visual attention and deep reinforcement learning. IEEE Access 7:25924\u201325935","journal-title":"IEEE Access"},{"issue":"4","key":"11862_CR20","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1179\/136821910X12651933390584","volume":"58","author":"K-H Jung","year":"2010","unstructured":"Jung K-H (2010) High-capacity steganographic method based on pixel-value differencing and LSB replacement methods. Imaging Sci J 58(4):213\u2013221","journal-title":"Imaging Sci J"},{"key":"11862_CR21","first-page":"103","volume":"13","author":"K-H Jung","year":"2018","unstructured":"Jung K-H (2018) Comparative histogram analysis of LSB-based image steganography. WSEAS Trans Syst Control 13:103\u2013112","journal-title":"WSEAS Trans Syst Control"},{"issue":"11","key":"11862_CR22","first-page":"79","volume":"52","author":"K-H Jung","year":"2015","unstructured":"Jung K-H, Seok W-J (2015) Research on steganography in emulab testbed. J Inst Electron Inf Eng 52(11):79\u201384","journal-title":"J Inst Electron Inf Eng"},{"key":"11862_CR23","doi-asserted-by":"crossref","unstructured":"Kaur G, Singh S, Rani R, Kumar R (2020) A comprehensive study of reversible data hiding (RDH) schemes based on pixel value ordering (PVO). Archives of Computational Methods in Engineering pp 1\u201352","DOI":"10.1007\/s11831-020-09512-3"},{"key":"11862_CR24","unstructured":"Kingma D P, Ba J (2014) Adam: a method for stochastic optimization. arxiv:1412.6980"},{"key":"11862_CR25","unstructured":"Krizhevsky A, Sutskever I , Hinton G (2012) ImageNet classification with deep convolutional neural networks. NIPS"},{"key":"11862_CR26","doi-asserted-by":"crossref","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. IEEE International Conference on Image Processing (ICIP), pp 4206\u20134210","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"11862_CR27","doi-asserted-by":"publisher","first-page":"4315","DOI":"10.1007\/s11042-018-7046-6","volume":"79","author":"S Li","year":"2019","unstructured":"Li S, Ye D, Jiang S (2019) Anti-steganalysis for image on convolutional neural networks. Multimed Tools Appl 79:4315\u20134331","journal-title":"Multimed Tools Appl"},{"key":"11862_CR28","doi-asserted-by":"publisher","first-page":"5756","DOI":"10.1002\/sec.1734","volume":"9","author":"X Liao","year":"2017","unstructured":"Liao X, Chen G, Yin J (2017) Content adaptive steganalysis for color images. Secur Commun Netw 9:5756\u20135763","journal-title":"Secur Commun Netw"},{"key":"11862_CR29","unstructured":"Parmar N, Vaswani A, Uszkoreit J (2018) Image transformer. arxiv:1802.05751"},{"key":"11862_CR30","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume":"6387","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Lect Notes Comput Sci 6387:161\u2013177","journal-title":"Lect Notes Comput Sci"},{"key":"11862_CR31","first-page":"94090J","volume":"94","author":"Y Qian","year":"2015","unstructured":"Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. Proc SPIE Med Watermark Sec Forensic 94:94090J","journal-title":"Proc SPIE Med Watermark Sec Forensic"},{"issue":"1","key":"11862_CR32","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1007\/s11042-019-08263-z","volume":"79","author":"R Rawat","year":"2020","unstructured":"Rawat R, Singh B, Sur A (2020) Steganalysis for clustering modification directions steganography. Multimed Tools Appl 79(1):1971\u20131986","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"11862_CR33","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2015","unstructured":"Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Secur 11(2):221\u2013234","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"11862_CR34","doi-asserted-by":"publisher","first-page":"4903","DOI":"10.1007\/s11042-020-09960-w","volume":"80","author":"B Singh","year":"2020","unstructured":"Singh B, Chhajed M, Sur A (2020) Steganalysis using learned denoising kernels. Multimed Tools Appl 80:4903\u20134917","journal-title":"Multimed Tools Appl"},{"key":"11862_CR35","doi-asserted-by":"crossref","unstructured":"Su A, He X, Zhao X (2020) JPEG steganalysis based on ResNeXt with gauss partial derivative filters. Multimed Tools Appl 1\u201318","DOI":"10.1007\/s11042-020-09350-2"},{"key":"11862_CR36","doi-asserted-by":"crossref","unstructured":"Su A, He X, Zhao X (2021) JPEG steganalysis based on ResNeXt with gauss partial derivative filters. Multimed Tools Appl 80(3):3349\u20133366","DOI":"10.1007\/s11042-020-09350-2"},{"issue":"4","key":"11862_CR37","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TIFS.2015.2507159","volume":"11","author":"W Tang","year":"2016","unstructured":"Tang W, Li H, Luo W, Huang J (2016) Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans Inf Forensic Secur 11(4):734\u2013745","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"11862_CR38","unstructured":"Vaswani A, Shazeer N, Parmar N (2017) Attention is all you need. arxiv:1706.03762"},{"key":"11862_CR39","doi-asserted-by":"crossref","unstructured":"Wang X, Girshick R, Gupta A (2017) Non-local neural networks. arxiv:1711.07971","DOI":"10.1109\/CVPR.2018.00813"},{"key":"11862_CR40","doi-asserted-by":"crossref","unstructured":"Xu G (2017) Deep convolutional neural network to detect J-UNIW ARD. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, IH&MMSec 2017, Philadelphia, June 20\u201322, 2017, pp 67\u201373","DOI":"10.1145\/3082031.3083236"},{"issue":"5","key":"11862_CR41","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu H (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708\u2013712","journal-title":"IEEE Signal Process Lett"},{"issue":"11","key":"11862_CR42","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensic Secur 12(11):2545\u20132557","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"11862_CR43","unstructured":"Zhang H, Goodfellow I, Metaxas D (2018) Self-attention generative adversarial networks. arxiv:1805.08318"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11862-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11862-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11862-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T07:29:59Z","timestamp":1700119799000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11862-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,25]]},"references-count":43,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["11862"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11862-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,25]]},"assertion":[{"value":"26 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}