{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T23:54:38Z","timestamp":1768694078534,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T00:00:00Z","timestamp":1547164800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61572518"],"award-info":[{"award-number":["No.61572518"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.u1636202"],"award-info":[{"award-number":["No.u1636202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61802430"],"award-info":[{"award-number":["No.61802430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61602511"],"award-info":[{"award-number":["No.61602511"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11554-019-00849-y","type":"journal-article","created":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T12:03:47Z","timestamp":1547208227000},"page":"635-647","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Deep neural networks for efficient steganographic payload location"],"prefix":"10.1007","volume":"16","author":[{"given":"Yu","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,11]]},"reference":[{"key":"849_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Secur. Priv. 1, 32\u201344 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"849_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"H Wang","year":"2004","unstructured":"Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47, 76\u201382 (2004)","journal-title":"Commun. ACM"},{"key":"849_CR3","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TIFS.2011.2160855","volume":"6","author":"TT Quach","year":"2011","unstructured":"Quach, T.T.: Optimal cover estimation methods and steganographic payload location. IEEE Trans. Inf. Forensics Secur. 6, 1214\u20131222 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"849_CR4","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), pp.\u00a0234\u2013239 (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"1","key":"849_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1\u201313 (2014)","journal-title":"EURASIP J. Inf. Secur."},{"key":"849_CR6","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Proc. Int. Workshop Inf. Hiding, pp.\u00a0161\u2013177 (2010)","DOI":"10.1007\/978-3-642-16435-4_13"},{"issue":"3","key":"849_CR7","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin, C., Chang, C., Chiu, Y.: A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting. IEEE Trans. Image Process. 23(3), 969\u2013978 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"849_CR8","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","volume":"153","author":"WZ Chuan Qin","year":"2018","unstructured":"Chuan Qin, W.Z., Cao, F., Zhang, X., Chin-Chen, C.: Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153, 109\u2013122 (2018)","journal-title":"Signal Process."},{"key":"849_CR9","doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey, In: Proceedings of the IEEE, vol. 87, pp. 1062\u20131078 (1999)","DOI":"10.1109\/5.771065"},{"key":"849_CR10","doi-asserted-by":"crossref","unstructured":"Sharp, T.: (2001) An Implementation of Key-Based Digital Signal Steganography, International Workshop on Information Hiding, pp.\u00a013\u201326 (2001)","DOI":"10.1007\/3-540-45496-9_2"},{"key":"849_CR11","doi-asserted-by":"crossref","unstructured":"Ker, A.D.: Locating steganographic payload via WS residuals. In: Proc. 10th Multimedia and Security Workshop, pp.\u00a027\u201331. ACM (2008)","DOI":"10.1145\/1411328.1411335"},{"key":"849_CR12","doi-asserted-by":"crossref","unstructured":"Ker, A.D., Lubenko, I.: Feature reduction and payload location with WAM steganalysis Proceedings of SPIE\u2014The International Society for Optical Engineering, p. 7254 (2009)","DOI":"10.1117\/12.805910"},{"issue":"1","key":"849_CR13","first-page":"145","volume":"31","author":"X Yan","year":"2016","unstructured":"Yan, X., Tao, Z., Ling, X., Ping, X.: New method for payload location aimed at LSB matching. J. Data Acquis. Process. 31(1), 145\u2013151 (2016) (in Chinese)","journal-title":"J. Data Acquis. Process."},{"key":"849_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078","volume":"4","author":"L Pibre","year":"2016","unstructured":"Pibre, L., Pasquet, J., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. Electron. Imaging 4, 1\u201311 (2016)","journal-title":"Electron. Imaging"},{"key":"849_CR15","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: (2015) Deep learning for steganalysis via convolutional neural networks, Proc. SPIE, vol.\u00a09409, p.\u00a094090J (2015)","DOI":"10.1117\/12.2083479"},{"key":"849_CR16","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23, 708\u2013712 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"849_CR17","doi-asserted-by":"crossref","unstructured":"Chen, M., Fridrich, J., Boroumand, M.: (2018) Deep learning regressors for quantitative steganalysis. Electronic imaging, media watermarking, security, and forensics, pp. 160-1-160-7(7) (2018)","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-160"},{"key":"849_CR18","doi-asserted-by":"crossref","unstructured":"Xie, S., Girshick, R., Dollar, P., et al. Aggregated residual transformations for deep neural networks. In: IEEE Conference on Computer Vision & Pattern Recognition. IEEE Computer Society (2017)","DOI":"10.1109\/CVPR.2017.634"},{"key":"849_CR19","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Laurens, V.D.M., Weinberger, K.Q.: Densely connected convolutional networks, pp. 2261\u20132269 (2016)","DOI":"10.1109\/CVPR.2017.243"},{"key":"849_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s11633-017-1053-3","volume":"14","author":"B Zhao","year":"2017","unstructured":"Zhao, B., Feng, J., Wu, X., Yan, S.: A survey on deep learning-based fine-grained object classification and semantic segmentation International. J. Autom. Comput. 14, 119\u2013135 (2017)","journal-title":"J. Autom. Comput."},{"key":"849_CR21","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep Residual learning for image recognition, pp 770\u2013778 (2015)","DOI":"10.1109\/CVPR.2016.90"},{"key":"849_CR22","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems (2012)"},{"key":"849_CR23","doi-asserted-by":"crossref","first-page":"3573","DOI":"10.1109\/TNNLS.2017.2732482","volume":"29","author":"SH Khan","year":"2015","unstructured":"Khan, S.H., Hayat, M., Bennamoun, M., Sohel, F.A., Togneri, R.: Cost-sensitive learning of deep feature representations from imbalanced data. IEEE Trans. Neural Netw. Learn. Syst. 29, 3573\u20133587 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"849_CR24","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21, 1263\u20131284 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"849_CR25","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: The Ins and outs of organizing BOSS. In Proc. Int. Workshop Inf. Hiding. Springer, Berlin, Heidelberg, pp.\u00a059\u201370 (2011)","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"849_CR26","unstructured":"Bas, P., Furon, T.: Bows-2. http:\/\/bows2.gipsa-lab.inpg.fr (2007)"},{"key":"849_CR27","doi-asserted-by":"crossref","unstructured":"Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T.: Caffe: Convolutional architecture for fast feature embedding, 675\u2013678 (2014)","DOI":"10.1145\/2647868.2654889"},{"key":"849_CR28","unstructured":"Zeiler, M.D.: (2012) ADADELTA: An adaptive learning rate method computer science"},{"key":"849_CR29","unstructured":"Simonyan, K., Zisserman, A.: (2014) Very deep convolutional networks for large-scale image recognition computer science"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00849-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00849-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00849-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T23:55:44Z","timestamp":1720914944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00849-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,11]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["849"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00849-y","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,11]]},"assertion":[{"value":"30 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}