{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:39:21Z","timestamp":1740145161732,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T00:00:00Z","timestamp":1531180800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636219","U1736214","61572052","61602508","61772549"],"award-info":[{"award-number":["U1636219","U1736214","61572052","61602508","61772549"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2016YFB0801303","2016QY01W0105"],"award-info":[{"award-number":["2016YFB0801303","2016QY01W0105"]}]},{"name":"Plan for Scientific Innovation Talent of Henan Province","award":["2018JR0018"],"award-info":[{"award-number":["2018JR0018"]}]},{"name":"Key Technologies Research and Development Program of Henan Province","award":["162102210032"],"award-info":[{"award-number":["162102210032"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11554-018-0805-9","type":"journal-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T08:47:48Z","timestamp":1531212468000},"page":"649-660","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient stego key recovery based on distribution differences of extracting message bits"],"prefix":"10.1007","volume":"16","author":[{"given":"Jiufen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Junjun","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Junchao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Che","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,10]]},"reference":[{"issue":"7","key":"805_CR1","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circ. Syst. Video Technol. 23(7), 1109\u20131118 (2013)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"805_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Qin, C., Zhang, W.M., Liu, F.L., Luo, X.Y.: On the fault-tolerant performance for a class of robust image steganography. Sig. Process. 146, 99\u2013111 (2018)","journal-title":"Sig. Process."},{"issue":"3","key":"805_CR3","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969\u2013978 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"805_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCSVT.2018.2873102","volume":"99","author":"YY Ma","year":"2018","unstructured":"Ma, Y.Y., Luo, X.Y., Li, X.L., Bao, Z.K., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set \u03b1-positive region reduction. IEEE Trans. Circ. Syst. Video Technol. 99, 1 (2018). \n                    https:\/\/doi.org\/10.1109\/TCSVT.2018.2799243","journal-title":"IEEE Trans. Circ. Syst. Video Technol"},{"issue":"21","key":"805_CR5","doi-asserted-by":"publisher","first-page":"13557","DOI":"10.1007\/s11042-015-2759-2","volume":"75","author":"XY Luo","year":"2016","unstructured":"Luo, X.Y., Song, X.F., Li, X.L., Zhang, W.M., Lu, J.C., Yang, C.F., Liu, F.L.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed. Tools Appl. 75(21), 13557\u201313583 (2016)","journal-title":"Multimed. Tools Appl."},{"key":"805_CR6","unstructured":"Upham, D.: JPEG-JSteg-V4, steganographic algorithm JSteg. \n                    http:\/\/zooid.org\/paul\/crypto\/jsteg"},{"key":"805_CR7","unstructured":"Provos, N.: Defending against statistical steganalysis. Proceedings of the 10th conference on USENIX Security Symposium-Volume\u00a010, USENIX Association, pp.\u00a024\u201324 (2001)"},{"key":"805_CR8","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5-A steganographic algorithm. Proceedings of the 4th International Workshop on Information Hiding, Springer-Verlag, pp 289\u2013302 (2001)","DOI":"10.1007\/3-540-45496-9_21"},{"issue":"5","key":"805_CR9","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"LJ Guo","year":"2014","unstructured":"Guo, L.J., Ni, J.Q., Shi, Y.Q.: Uniform embedding for efficient JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814\u2013825 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"805_CR10","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Digital image steganography using universal distortion. Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, pp.\u00a059\u201368 (2013)","DOI":"10.1145\/2482513.2482514"},{"issue":"5","key":"805_CR11","doi-asserted-by":"publisher","first-page":"050501","DOI":"10.1117\/1.JEI.25.5.050501","volume":"25","author":"ZC Wang","year":"2016","unstructured":"Wang, Z.C., Zhang, X.P., Yin, Z.X.: Hybrid distortion function for JPEG steganography. J. Electron. Imaging 25(5), 050501 (2016)","journal-title":"J. Electron. Imaging"},{"key":"805_CR12","unstructured":"Denemark, T., Fridrich, J.: Model based steganography with precover. Electron. Imaging. 2017(7), 56\u201366 (2017)"},{"key":"805_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5134-7","author":"JJ Gan","year":"2017","unstructured":"Gan, J.J., Liu, J.F., Luo, X.Y., Yang, C.F., Liu, F.L.: Reliable steganalysis of HUGO steganography based on partially known plaintext. Multimed. Tools Appl. (2017). \n                    https:\/\/doi.org\/10.1007\/s11042-017-5134-7","journal-title":"Multimed. Tools Appl."},{"key":"805_CR14","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D.: Searching for the stego-key. Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, pp.\u00a070\u201382 (2004)","DOI":"10.1117\/12.521353"},{"key":"805_CR15","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Ker, A.D.: Steganographic key leakage through payload metadata. Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp.\u00a0109\u2013114 (2014)","DOI":"10.1145\/2600918.2600921"},{"key":"805_CR16","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography. Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp.\u00a0631\u2013642 (2005)","DOI":"10.1117\/12.585987"},{"issue":"4","key":"805_CR17","doi-asserted-by":"publisher","first-page":"309","DOI":"10.4304\/jmm.7.4.309-313","volume":"7","author":"J Liu","year":"2012","unstructured":"Liu, J., Tang, G.M.: Stego key estimation in LSB steganography. J. Multimed. 7(4), 309\u2013313 (2012)","journal-title":"J. Multimed."},{"issue":"5","key":"805_CR18","first-page":"73","volume":"31","author":"JY Chen","year":"2010","unstructured":"Chen, J.Y., Zhu, Y.F., Zhang, W.M., Liu, J.F.: Chosen-key extracting attack to random LSB steganography. J. Commun. 31(5), 73\u201380 (2010)","journal-title":"J. Commun."},{"issue":"3","key":"805_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-012-4779-0","volume":"59","author":"JF Liu","year":"2016","unstructured":"Liu, J.F., Tian, Y.G., Han, T., Wang, J.C., Luo, X.Y.: Stego key searching for LSB steganography on JPEG decompressed image. Sci. China Inf. Sci. 59(3), 1\u201315 (2016)","journal-title":"Sci. China Inf. Sci."},{"issue":"4","key":"805_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-017-4878-4","volume":"2017","author":"C Xu","year":"2017","unstructured":"Xu, C., Liu, J.F., Gan, J.J., Luo, X.Y.: Stego key recovery based on the optimal hypothesis test. Multimed. Tools Appl. 2017(4), 1\u201320 (2017). \n                    https:\/\/doi.org\/10.1007\/s11042-017-4878-4","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"805_CR21","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TCSII.2006.870213","volume":"53","author":"A Giannoula","year":"2006","unstructured":"Giannoula, A., Boulgouris, N.V., Hatzinakos, D., Plataniotis, K.: Watermark detection for noisy interpolated images. IEEE Trans. Circ. Syst. II Express Briefs 53(5), 359\u2013403 (2006)","journal-title":"IEEE Trans. Circ. Syst. II Express Briefs"},{"key":"805_CR22","volume-title":"Testing Statistical Hypotheses","author":"EL Lehmann","year":"2006","unstructured":"Lehmann, E.L., Romano, J.P.: Testing Statistical Hypotheses. Springer, Berlin (2006)"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-018-0805-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-018-0805-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-018-0805-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,22]],"date-time":"2019-09-22T21:44:38Z","timestamp":1569188678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-018-0805-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,10]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["805"],"URL":"https:\/\/doi.org\/10.1007\/s11554-018-0805-9","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2018,7,10]]},"assertion":[{"value":"27 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}