{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:27:55Z","timestamp":1744194475494,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-018-5790-6","type":"journal-article","created":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T04:46:42Z","timestamp":1526878002000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Unsupervised Optimization for Universal Spatial Image Steganalysis"],"prefix":"10.1007","volume":"102","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5884-5733","authenticated-orcid":false,"given":"Anita Christaline","family":"Johnvictor","sequence":"first","affiliation":[]},{"given":"Ramesh","family":"Rangaswamy","sequence":"additional","affiliation":[]},{"given":"Gomathy","family":"Chidambaram","sequence":"additional","affiliation":[]},{"given":"Vaishali","family":"Durgamahanthi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,21]]},"reference":[{"issue":"1","key":"5790_CR1","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","volume":"192","author":"C Cachin","year":"2004","unstructured":"Cachin, C. (2004). An information-theoretic model for steganography. Information and Computation Elsevier, 192(1), 41\u201356.","journal-title":"Information and Computation Elsevier"},{"issue":"2","key":"5790_CR2","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Bas, P., & Fridrich, J. (2010). Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2), 215\u2013224.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5790_CR3","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume":"6387","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Filler, T., & Bas, P. (2010). Using high-dimensional image models to perform Highly undetectable steganography. International Workshop on Information Hiding, 6387, 161\u2013177.","journal-title":"International Workshop on Information Hiding"},{"key":"5790_CR4","unstructured":"Holub, V., Fridrich, J., & Denemark, T. (2014). Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security. \n                    http:\/\/jis.eurasipjournals.com\/content\/2014\/1\/1\n                    \n                  . Accessed December 25, 2016."},{"key":"5790_CR5","doi-asserted-by":"crossref","unstructured":"Holub, V., & Fridrich, J. (2012). Designing steganographic distortion using directional filters. In Fourth IEEE international workshop on information forensics and security (pp. 234\u2013239).","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"30","key":"5790_CR6","first-page":"868","volume":"7","author":"J Fridrich","year":"2011","unstructured":"Fridrich, J., & Kodovsky, J. (2011). Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(30), 868\u2013882.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"5790_CR7","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., & Fridrich, J. (2011). Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(3), 920\u2013935.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5790_CR8","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Holotyak, Y. (2006). New blind steganalysis and its implications. In Electronic imaging (p. 607201-13).","DOI":"10.1117\/12.643254"},{"key":"5790_CR9","doi-asserted-by":"crossref","unstructured":"Zou, D., Shi, Y. Q., & Xuan, W. S. G. (2006). Steganalysis based on Markov model of thresholded prediction-error image. In Proceedings IEEE international conference on multimedia and expo (pp. 1365\u20131368).","DOI":"10.1109\/ICME.2006.262792"},{"key":"5790_CR10","unstructured":"Ker, A. D., & Bohme, R. (2012). Revisiting weighted stego-image steganalysis. In Electronic imaging (p. 681905-17)."},{"issue":"2","key":"5790_CR11","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky, J., Fridrich, J., & Holub, V. (2012). Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2), 432\u2013444. \n                    https:\/\/doi.org\/10.1109\/tifs.2011.2175919\n                    \n                  .","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5790_CR12","doi-asserted-by":"publisher","DOI":"10.1117\/12.1000330","author":"V Holub","year":"2013","unstructured":"Holub, V., Fridrich, J., & Denemark, T. (2013). Random projections of residuals as an alternative to co-occurrences in steganalysis. IS&T\/SPIE Electronic Imaging. \n                    https:\/\/doi.org\/10.1117\/12.1000330\n                    \n                  .","journal-title":"IS&T\/SPIE Electronic Imaging"},{"issue":"1","key":"5790_CR13","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.neunet.2009.08.007","volume":"23","author":"KL Du","year":"2010","unstructured":"Du, K. L. (2010). Clustering\u2014A neural network approach. Journal Neural Networks, 23(1), 89\u2013107.","journal-title":"Journal Neural Networks"},{"key":"5790_CR14","unstructured":"Shi, Y. Q., Chen, C., & Chen, W. (2006). A Markov process based approach to effective attacking JPEG steganography. In: Proceedings of the 8th international workshop information hiding (pp. 249\u2013264). Springer, Berlin."},{"key":"5790_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1117\/12.526012","volume":"5301","author":"S Lyu","year":"2004","unstructured":"Lyu, S., & Farid, H. (2004). Steganalysis using color wavelet statistics and one-class vector support machines. Proceedings of SPIE Security Steganography Watermarking of Multimedia Contents, 5301, 35\u201345.","journal-title":"Proceedings of SPIE Security Steganography Watermarking of Multimedia Contents"},{"issue":"4","key":"5790_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2086737.2086743","volume":"5","author":"HF Yu","year":"2012","unstructured":"Yu, H. F., Hsieh, C. J., Chang, K. W., & Lin, C. J. (2012). Large linear classification when data cannot fit in memory. ACM Transactions on Knowledge Discovery From Data, 5(4), 1\u201323. \n                    https:\/\/doi.org\/10.1145\/2086737.2086743\n                    \n                  .","journal-title":"ACM Transactions on Knowledge Discovery From Data"},{"issue":"2","key":"5790_CR17","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5121\/ijdkp.2015.5203","volume":"5","author":"Y Sri Lalitha","year":"2015","unstructured":"Sri Lalitha, Y., & Govardhan, A. (2015). Improved Text Clustering with Neighbours. International Journal of Data Mining & Knowledge Management Process (IJDKP), 5(2), 23\u201337. \n                    https:\/\/doi.org\/10.5121\/ijdkp.2015.5203\n                    \n                  .","journal-title":"International Journal of Data Mining & Knowledge Management Process (IJDKP)"},{"key":"5790_CR18","doi-asserted-by":"crossref","unstructured":"Sheikhan, M., Moin, M. S., & Pezhmanpour, M. (2010). Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform. In Intelligent systems design and applications (ISDA) (pp. 368\u2013372).","DOI":"10.1109\/ISDA.2010.5687236"},{"key":"5790_CR19","first-page":"2749","volume":"17","author":"I Avcibas","year":"2005","unstructured":"Avcibas, I., Kharrazib, M., Memon, N., & Sankurd, B. (2005). Image steganalysis with binary similarity measures. EURASIP JASP, 17, 2749\u20132757.","journal-title":"EURASIP JASP"},{"key":"5790_CR20","doi-asserted-by":"crossref","unstructured":"Pevny, T., & Fridrich, J. (2007). Merging Markov and DCT features for multi-class jpeg steganalysis. In IS and T\/SPIE EI (Vol. 6505).","DOI":"10.1117\/12.696774"},{"issue":"5","key":"5790_CR21","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1109\/TNN.2006.875979","volume":"17","author":"T Windeatt","year":"2006","unstructured":"Windeatt, T. (2006). Accuracy\/diversity and ensemble MLP classifier design. IEEE Transactions on Neural Networks, 17(5), 1194\u20131211.","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"6","key":"5790_CR22","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/0167-8655(96)00021-9","volume":"17","author":"PD Gader","year":"1996","unstructured":"Gader, P. D., Mohamed, M. A., & Keller, M. (1996). Fusion of handwritten word classifiers. Pattern Recognition Letters\u2014Special Issue on Fuzzy Set Technology in Pattern Recognition, 17(6), 577\u2013584. \n                    https:\/\/doi.org\/10.1016\/0167-8655(96)00021-9\n                    \n                  .","journal-title":"Pattern Recognition Letters\u2014Special Issue on Fuzzy Set Technology in Pattern Recognition"},{"issue":"2","key":"5790_CR23","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0031-3203(99)00223-X","volume":"34","author":"LI Kuncheva","year":"2001","unstructured":"Kuncheva, L. I., Bezdek, J. C., & Duin, R. P. W. (2001). Decision templates for multiple classifier fusion: An experimental comparison. Pattern Recognition, 34(2), 299\u2013314.","journal-title":"Pattern Recognition"},{"key":"5790_CR24","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., & Pevny, T. (2011). Break our steganographic system\u2014The ins and outs of organizing BOSS. In Proceedings of information hiding conference (Vol. 6958, pp. 59\u201370).","DOI":"10.1007\/978-3-642-24178-9_5"},{"issue":"1\u20132","key":"5790_CR25","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10618-010-0197-3","volume":"22","author":"M Kantarcioglu","year":"2011","unstructured":"Kantarcioglu, M., Xi, B., & Clifton, C. (2011). Classifier evaluation and attribute selection against active adversaries. Data Mining and Knowledge Discovery\u2014DATAMINE, 22(1\u20132), 291\u2013335. \n                    https:\/\/doi.org\/10.1007\/s10618-010-0197-3\n                    \n                  .","journal-title":"Data Mining and Knowledge Discovery\u2014DATAMINE"},{"key":"5790_CR26","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Kodovsk\u00fd, J., Goljan, M., & Holub, V. (2011). Steganalysis of content-adaptive steganography in spatial domain. In T. Filler, T. Pevn\u00fd, A. Ker, & S. Craver (Eds.), Information Hiding, 13th International Workshop, volume 6958 of Lecture Notes in Computer Science (pp. 102\u2013117). Prague, Czech Republic, May 18\u201320, 2011.","DOI":"10.1007\/978-3-642-24178-9_8"},{"key":"5790_CR27","unstructured":"Chonev, V. K., & Ker, A. D. (2011). Feature restoration and distortion metrics. In Multimedia Watermarking, Security and Forensics XIII, volume 7880 of Proc. SPIE, 2011 (pp. 0G01\u20130G14)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5790-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5790-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5790-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T16:20:40Z","timestamp":1558542040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5790-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,21]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5790"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5790-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,5,21]]},"assertion":[{"value":"21 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}