{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T06:44:32Z","timestamp":1759041872570},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T00:00:00Z","timestamp":1268352000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s11265-010-0460-2","type":"journal-article","created":{"date-parts":[[2010,3,11]],"date-time":"2010-03-11T10:14:09Z","timestamp":1268302449000},"page":"367-373","source":"Crossref","is-referenced-by-count":17,"title":["CBS: Contourlet-Based Steganalysis Method"],"prefix":"10.1007","volume":"61","author":[{"given":"Hedieh","family":"Sajedi","sequence":"first","affiliation":[]},{"given":"Mansour","family":"Jamzad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,3,12]]},"reference":[{"key":"460_CR1","doi-asserted-by":"crossref","unstructured":"Xuan, G., Shi, Y., Gao, J., & Zou, D. (2005). Steganalysis based on multiple features formed by statistical moments of Wavelet characteristic functions. In Proc. of International Workshop on Information Hiding, pp. 262\u2013277.","DOI":"10.1007\/11558859_20"},{"key":"460_CR2","unstructured":"Lyu, S., & Farid, H. (2002). Detecting hidden messages using higher-order statistics and support vector machines. In Proc. of 5th International Workshop on Information Hiding."},{"issue":"1","key":"460_CR3","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TIFS.2005.863485","volume":"1","author":"H Farid","year":"2006","unstructured":"Farid, H., & Lyu, S. (2006). Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, 1(1), 111\u2013119.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"460_CR4","doi-asserted-by":"crossref","first-page":"041104","DOI":"10.1117\/1.2400672","volume":"15","author":"M Kharrazi","year":"2006","unstructured":"Kharrazi, M., Sencar, H. T., & Memon, N. (2006). Performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging, 15(4), 041104\u2013041116.","journal-title":"Journal of Electronic Imaging"},{"key":"460_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich, J. (2004). Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Proc. of 6th International Workshop on Information Hiding.","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"460_CR6","doi-asserted-by":"crossref","unstructured":"Raghavendra, B. S., & Subbanna Bhat, P. (2004). Contourlet based multiresolution texture segmentation using contextual Hidden Markov Models. In Proc. of International Conference on Computer and Information Technology (CIT), pp. 336\u2013343.","DOI":"10.1007\/978-3-540-30561-3_35"},{"key":"460_CR7","unstructured":"Sallee, P. (2003). Model-based steganography. In Proc. of International Workshop on Digital Watermarking."},{"key":"460_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., & Soukal, D. (2004). Perturbed quantization steganography with wet paper codes. In Proc. of ACM Multimedia Workshop.","DOI":"10.1145\/1022431.1022435"},{"key":"460_CR9","doi-asserted-by":"crossref","unstructured":"Solanki, K., Sarkar, A., & Manjunath, B. S. (2007). YASS: Yet another steganographic scheme that resists blind steganalysis. In Proc. of 9th International Workshop on Information Hiding.","DOI":"10.1007\/978-3-540-77370-2_2"},{"key":"460_CR10","doi-asserted-by":"crossref","unstructured":"Sajedi, H., & Jamzad, M. (2009). \u201cContSteg: Contourlet-based steganography method\u201d, Wireless Sensor Network, Scientific Research Publishing (SRP) in California (US), 1(3), 163\u2013170.","DOI":"10.4236\/wsn.2009.13022"},{"key":"460_CR11","doi-asserted-by":"crossref","unstructured":"Sarkar, A., Solanki, K., & Manjunath, B. S. (2008). Further study on YASS: Steganography based on Randomized Embedding to Resist Blind Steganalysis. Proc. of SPIE\u2014Security, Steganography, and Watermarking of Multimedia Contents.","DOI":"10.1117\/12.767893"},{"key":"460_CR12","unstructured":"Lu, Y., & Do, M. N. (2005). A directional extension for multidimensional wavelet transforms. IEEE Trans. Image Processing."},{"key":"460_CR13","unstructured":"Baraniuk, R. G., Kingsbury, N., & Selesnick, I. W. (2005). The dual-tree complex wavelet transform\u2014a coherent framework for multiscale signal and image processing. IEEE Signal Processing Magazine."},{"key":"460_CR14","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/ICIP.2002.1038034","volume":"1","author":"MN Do","year":"2002","unstructured":"Do, M. N., & Vetterli, M. (2002). Contourlets: a directional multiresolution image representation. Proceedings of IEEE International Conference on Image processing, 1, 357\u2013360.","journal-title":"Proceedings of IEEE International Conference on Image processing"},{"key":"460_CR15","doi-asserted-by":"crossref","unstructured":"Po, D. D.-Y., & Do, M. N. (2003). Directional multiscale modeling of images using the contourlet transform. In Proc. of IEEE Workshop on Statistical Signal Processing, pp. 262\u2013265.","DOI":"10.1109\/SSP.2003.1289394"},{"key":"460_CR16","doi-asserted-by":"crossref","unstructured":"Long, Z., & Younan, N. H. (2006). Contourlet spectral histogram for texture classification. In Proc. of IEEE Southwest Symposium on Image Analysis and Interpretation, pp. 31\u201335.","DOI":"10.1109\/SSIAI.2006.1633716"},{"issue":"6","key":"460_CR17","doi-asserted-by":"crossref","first-page":"1610","DOI":"10.1109\/TIP.2006.873450","volume":"15","author":"DD-Y Po","year":"2006","unstructured":"Po, D. D.-Y., & Do, M. N. (2006). Directional multiscale modeling of images using the contourlet transform. IEEE Transactions on Image Processing, 15(6), 1610\u20131620.","journal-title":"IEEE Transactions on Image Processing"},{"key":"460_CR18","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJC Burges","year":"1998","unstructured":"Burges, C. J. C. (1998). A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2, 121\u2013167.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"460_CR19","unstructured":"http:\/\/www.cs.washington.edu\/research\/imagedatabase"},{"key":"460_CR20","unstructured":"Asadi, N., Jamzad, M., & Sajedi, H. (2008). Improvements of image steganalysis using boosted combinatorial classifiers and guassian highpass filtering. In Proc. of 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-010-0460-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11265-010-0460-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-010-0460-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T12:19:33Z","timestamp":1559391573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11265-010-0460-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,12]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["460"],"URL":"https:\/\/doi.org\/10.1007\/s11265-010-0460-2","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,12]]}}}