{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:04:43Z","timestamp":1759133083154,"version":"3.37.3"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:00:00Z","timestamp":1559088000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:00:00Z","timestamp":1559088000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00885-8","type":"journal-article","created":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:22:32Z","timestamp":1559139752000},"page":"137-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Efficient binary image steganalysis based on ensemble neural network of multi-module"],"prefix":"10.1007","volume":"17","author":[{"given":"Jiarui","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4068-1766","authenticated-orcid":false,"given":"Wei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yilin","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Junjia","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhaopeng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ruipeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,29]]},"reference":[{"key":"885_CR1","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.jvcir.2018.06.004","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen, J., Lu, W., Fang, Y.: Binary image steganalysis based on local texture pattern. J. Visual Commun. Image Represent. 55, 149\u2013156 (2018)","journal-title":"J. Visual Commun. Image Represent."},{"key":"885_CR2","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.jvcir.2018.06.004","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen, J., Lu, W., Fang, Y., Liu, X., Yeung, Y., Xue, Y.: Binary image steganalysis based on local texture pattern. J. Visual Commun. Image Represent. 55, 149\u2013156 (2018)","journal-title":"J. Visual Commun. Image Represent."},{"issue":"2","key":"885_CR3","first-page":"201","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen, J., Lu, W., Yeung, Y., Xue, Y., Liu, X., Lin, C., Zhang, Y.: Binary image steganalysis based on distortion level co-occurrence matrix. Comput. Mater. Continua 55(2), 201\u2013211 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"3","key":"885_CR4","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen, L., Lu, W., Ni, J., Sun, W., Huang, J.: Region duplication detection based on harris corner points and step sector statistics. J. Visual Commun. Image Represent. 24(3), 244\u2013254 (2013)","journal-title":"J. Visual Commun. Image Represent."},{"issue":"9","key":"885_CR5","doi-asserted-by":"crossref","first-page":"3938","DOI":"10.1109\/TNNLS.2017.2740318","volume":"29","author":"X Chen","year":"2018","unstructured":"Chen, X., Weng, J., Lu, W., Weng, J.: Deep manifold learning combined with convolutional neural networks for action recognition. IEEE Trans. Neural Netw. Learning Syst. 29(9), 3938\u20133952 (2018)","journal-title":"IEEE Trans. Neural Netw. Learning Syst."},{"issue":"7","key":"885_CR6","doi-asserted-by":"crossref","first-page":"1697","DOI":"10.1109\/TPAMI.2017.2726061","volume":"40","author":"X Chen","year":"2018","unstructured":"Chen, X., Weng, J., Lu, W., Xu, J.: Multi-gait recognition based on attribute discovery. IEEE Trans. Pattern Anal. Machine Intell. 40(7), 1697\u20131710 (2018)","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"key":"885_CR7","first-page":"3645","volume":"3","author":"G Chhajed","year":"2011","unstructured":"Chhajed, G.: Review on binary image steganography and watermarking. Int. J. Comput. Sci. Eng. 3, 3645\u20133651 (2011)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"885_CR8","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.engappai.2016.12.022","volume":"59","author":"Y Fan","year":"2017","unstructured":"Fan, Y., Li, J., Lu, W., Weng, J.: Copy-move forgery detection based on hybrid features. Eng. Appl. Artif. Intell. 59, 73\u201383 (2017)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"885_CR9","doi-asserted-by":"crossref","unstructured":"Feng, B., Lu, W., Dai, L., Sun, W.: Steganography based on high-dimensional reference table. In: Proc 13th International Workshop on Digital-Forensics and Watermarking 9023, 574\u2013587 (2015)","DOI":"10.1007\/978-3-319-19321-2_44"},{"key":"885_CR10","doi-asserted-by":"crossref","unstructured":"Feng, B., Lu, W., Sun, W.: High capacity data hiding scheme for binary images based on minimizing flipping distortion. In: Proc 12th International Workshop on Digital-Forensics and Watermarking 8389, 514\u2013528 (2014)","DOI":"10.1007\/978-3-662-43886-2_37"},{"issue":"2","key":"885_CR11","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/TIFS.2014.2368364","volume":"10","author":"B Feng","year":"2014","unstructured":"Feng, B., Lu, W., Sun, W.: Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans. Inf. Forensics Security 10(2), 243\u2013255 (2014)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"C","key":"885_CR12","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.jvcir.2014.10.003","volume":"26","author":"B Feng","year":"2015","unstructured":"Feng, B., Lu, W., Sun, W.: Binary image steganalysis based on pixel mesh markov transition matrix. J. Visual Commun. Image Represent. 26(C), 284\u2013295 (2015)","journal-title":"J. Visual Commun. Image Represent."},{"issue":"21","key":"885_CR13","doi-asserted-by":"crossref","first-page":"9623","DOI":"10.1007\/s11042-014-2140-x","volume":"74","author":"B Feng","year":"2015","unstructured":"Feng, B., Lu, W., Sun, W.: Novel steganographic method based on generalized $$k$$-distance $$n$$-dimensional pixel matching. Multimed. Tools Appl. 74(21), 9623\u20139646 (2015)","journal-title":"Multimed. Tools Appl."},{"key":"885_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.image.2015.10.007","volume":"41","author":"B Feng","year":"2016","unstructured":"Feng, B., Lu, W., Sun, W., Huang, J., Shi, Y.Q.: Robust image watermarking based on tucker decomposition and adaptive-lattice quantization index modulation. Signal Processing Image Commun. 41, 1\u201314 (2016)","journal-title":"Signal Processing Image Commun."},{"key":"885_CR15","unstructured":"Feng, B., Lu, W., Sun, W., Liang, Z., Liu, J.: Blind watermarking based on adaptive lattice quantization index modulation. In: International Workshop on Digital-Forensics and Watermarking 9569, 239\u2013249 (2015)"},{"key":"885_CR16","doi-asserted-by":"crossref","unstructured":"Feng, B., Weng, J., Lu, W.: Improved algorithms for robust histogram shape-based image watermarking. International In: Workshop on Digital-Forensics and Watermarking, Lecture Notes in Computer Science 10431, 275\u2013289 (2017)","DOI":"10.1007\/978-3-319-64185-0_21"},{"key":"885_CR17","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.jvcir.2017.01.008","volume":"46","author":"B Feng","year":"2017","unstructured":"Feng, B., Weng, J., Lu, W., Bei, P.: Steganalysis of content-adaptive binary image data hiding. J. Visual Commun. Image Represent. 46, 119\u2013127 (2017)","journal-title":"J. Visual Commun. Image Represent."},{"key":"885_CR18","doi-asserted-by":"crossref","unstructured":"Feng, B., Weng, J., Lu, W., Pei, B.: Multiple watermarking using multilevel quantization index modulation. In: International Workshop on Digital-Forensics and Watermarking, Lecture Notes in Computer Science 10082, 312\u2013326 (2017)","DOI":"10.1007\/978-3-319-53465-7_23"},{"key":"885_CR19","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.jvcir.2017.01.008","volume":"46","author":"B Feng","year":"2017","unstructured":"Feng, B., Weng, J., Lu, W., Pei, B.: Steganalysis of content-adaptive binary image data hiding. J. Visual Commun. Image Represent. 46, 119\u2013127 (2017)","journal-title":"J. Visual Commun. Image Represent."},{"issue":"3","key":"885_CR20","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Security 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"3","key":"885_CR21","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"885_CR22","first-page":"2672","volume":"3","author":"IJ Goodfellow","year":"2014","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Adv. Neural Inf. Processing Syst. 3, 2672\u20132680 (2014)","journal-title":"Adv. Neural Inf. Processing Syst."},{"issue":"9","key":"885_CR23","doi-asserted-by":"crossref","first-page":"1508","DOI":"10.1109\/TIFS.2013.2274041","volume":"8","author":"C Hong","year":"2013","unstructured":"Hong, C., Kot, A.C.: On establishing edge adaptive grid for bilevel image data hiding. IEEE Trans. Inf. Forensics Security 8(9), 1508\u20131518 (2013)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"2","key":"885_CR24","doi-asserted-by":"crossref","first-page":"47","DOI":"10.4018\/IJDCF.2019040104","volume":"11","author":"X Huang","year":"2018","unstructured":"Huang, X., Liu, Z., Lu, W.: Fast and effective copy-move detection of digital audio based on auto segment. Int. J. Digital Crime Forensics 11(2), 47\u201362 (2018)","journal-title":"Int. J. Digital Crime Forensics"},{"issue":"5","key":"885_CR25","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/LSP.2018.2816569","volume":"25","author":"B Li","year":"2018","unstructured":"Li, B., Wei, W., Ferreira, A., Tan, S.: Rest-net: diverse activation modules and parallel sub-nets based cnn for spatial image steganalysis. IEEE Signal Processing Lett. 25(5), 650\u2013654 (2018)","journal-title":"IEEE Signal Processing Lett."},{"key":"885_CR26","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.jvcir.2016.06.003","volume":"40","author":"J Li","year":"2016","unstructured":"Li, J., Lu, W.: Blind image motion deblurring with l0-regularized priors. J. Visual Commun. Image Represent. 40, 14\u201323 (2016)","journal-title":"J. Visual Commun. Image Represent."},{"issue":"24","key":"885_CR27","doi-asserted-by":"crossref","first-page":"31895","DOI":"10.1007\/s11042-018-6175-2","volume":"77","author":"J Li","year":"2018","unstructured":"Li, J., Lu, W., Weng, J., Mao, Y., Li, G.: Double jpeg compression detection based on block statistics. Multimed. Tools Appl. 77(24), 31895\u201331910 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"20","key":"885_CR28","doi-asserted-by":"crossref","first-page":"20483","DOI":"10.1007\/s11042-016-3967-0","volume":"76","author":"J Li","year":"2017","unstructured":"Li, J., Yang, F., Lu, W., Sun, W.: Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed. Tools Appl. 76(20), 20483\u201320497 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"885_CR29","doi-asserted-by":"crossref","first-page":"10033","DOI":"10.1007\/s11042-017-4946-9","volume":"77","author":"X Liao","year":"2018","unstructured":"Liao, X., Guo, S., Wang, H., Li, X., Sangaiah, A.K.: New cubic reference table based image steganography. Multimed. Tools Appl. 77(8), 10033\u201310050 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"20","key":"885_CR30","doi-asserted-by":"crossref","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao, X., Li, K., Yin, J.: Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed. Tools Appl. 76(20), 20739\u201320753 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"885_CR31","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao, X., Qin, Z., Ding, L.: Data embedding in digital images using critical functions. Signal Processing Image Commun. 58, 146\u2013156 (2017)","journal-title":"Signal Processing Image Commun."},{"key":"885_CR32","doi-asserted-by":"crossref","unstructured":"Lin, C., Lu, W.: Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications (2018)","DOI":"10.1007\/s11042-018-6922-4"},{"key":"885_CR33","doi-asserted-by":"crossref","unstructured":"Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H.: Region duplication detection based on hybrid feature and evaluative clustering. Multimed. Tools Appl. (2019)","DOI":"10.1007\/s11042-019-7342-9"},{"issue":"11","key":"885_CR34","doi-asserted-by":"crossref","first-page":"14241","DOI":"10.1007\/s11042-017-5027-9","volume":"77","author":"C Lin","year":"2018","unstructured":"Lin, C., Lu, W., Sun, W., Zeng, J., Xu, T., Lai, J.H.: Region duplication detection based on image segmentation and keypoint contexts. Multimed. Tools Appl. 77(11), 14241\u201314258 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"885_CR35","doi-asserted-by":"crossref","unstructured":"Lin, X., Feng, B., Lu, W., Sun, W.: Content-adaptive residual for steganalysis. In: Proc 13th International Workshop on Digital-Forensics and Watermarking 9023, 389\u2013398 (2015)","DOI":"10.1007\/978-3-319-19321-2_29"},{"key":"885_CR36","unstructured":"Liu, J., Lu, W., Liu, K., Huang, X., Lin, C., Liu, X.: Copy-move forgery detection based on super pixel segmentation. Journal of Applied Sciences (2018)"},{"key":"885_CR37","doi-asserted-by":"crossref","unstructured":"Liu, X., Lu, W., Huang, T., Liu, H., Xue, Y., Yeung, Y.: Scaling factor estimation on jpeg compressed images by cyclostationarity analysis. Multimed. Tools Appl. 1-8 (2018)","DOI":"10.1007\/s11042-018-6411-9"},{"key":"885_CR38","doi-asserted-by":"crossref","unstructured":"Liu, X., Lu, W., Zhang, Q., Huang, J., Shi, Y.Q.: Downscaling factor estimation on pre-jpeg compressed images. IEEE Trans. Circuits Syst. Video Technol (2019)","DOI":"10.1109\/TCSVT.2019.2893353"},{"key":"885_CR39","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lu, W.: Fast copy-move detection of digital audio. In: IEEE Second International Conference on Data Science in Cyberspace, pp.\u00a026\u201329 (2017)","DOI":"10.1109\/DSC.2017.11"},{"issue":"99","key":"885_CR40","first-page":"1","volume":"PP","author":"W Lu","year":"2018","unstructured":"Lu, W., He, L., Yeung, Y., Xue, Y., Liu, H., Feng, B.: Secure binary image steganography based on fused distortion measurement. IEEE Trans. Circuits Syst. Video Technol. PP(99), 1\u20131 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"21","key":"885_CR41","doi-asserted-by":"crossref","first-page":"13557","DOI":"10.1007\/s11042-015-2759-2","volume":"75","author":"X Luo","year":"2016","unstructured":"Luo, X., Song, X., Li, X., Zhang, W.: Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed. Tools Appl. 75(21), 13557\u201313583 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"99","key":"885_CR42","first-page":"1","volume":"PP","author":"Y Ma","year":"2018","unstructured":"Ma, Y., Luo, X., Li, X., Bao, Z., Yi, Z.: Selection of rich model steganalysis features based on decision rough set ($$\\alpha$$)-positive region reduction. IEEE Trans. Circuits Syst. Video Technol. PP(99), 1\u20131 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"885_CR43","unstructured":"Meng, G., Zhang, H.: High capacity data hiding for binary image authentication. In: International Conference on Pattern Recognition (2010)"},{"issue":"11","key":"885_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2017.2767708","volume":"12","author":"J Ni","year":"2017","unstructured":"Ni, J., Ye, J., Yang, Y.I.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Security 12(11), 1\u20131 (2017)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"12","key":"885_CR45","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Processing 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Processing"},{"key":"885_CR46","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Proceedings of SPIE\u2014The International Society for Optical Engineering vol.\u00a09409, p.\u00a094090J (2015)","DOI":"10.1117\/12.2083479"},{"key":"885_CR47","unstructured":"Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: Ssgan: Secure steganography based on generative adversarial networks. In: Pacific Rim Conference on Multimedia (2017)"},{"key":"885_CR48","doi-asserted-by":"crossref","unstructured":"Tan, S., Li, B.: Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal & Information Processing Association Summit & Conference (2014)","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"885_CR49","unstructured":"Volkhonskiy, D., Nazarov, I., Borisenko, B., Burnaev, E.: Steganographic generative adversarial networks. arXiv: Multimedia (2017)"},{"issue":"4","key":"885_CR50","doi-asserted-by":"crossref","first-page":"90","DOI":"10.4018\/IJDCF.2018100107","volume":"10","author":"R Wang","year":"2018","unstructured":"Wang, R., Lu, W., Li, J.: Digital image splicing detection based on markov features in QDCT and OWT domain. Int. J. Digit. Crime Forensics 10(4), 90\u2013107 (2018)","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"885_CR51","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.jvcir.2018.06.019","volume":"55","author":"H Wu","year":"2018","unstructured":"Wu, H., Weng, J., Chen, X., Lu, W.: Feedback weight convolutional neural network for gait recognition. J. Visual Commun. Image Represent. 55, 424\u2013432 (2018)","journal-title":"J. Visual Commun. Image Represent."},{"key":"885_CR52","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.jvcir.2018.12.048","volume":"59","author":"H Xiao","year":"2019","unstructured":"Xiao, H., Lu, W., Li, R., Zhong, N., Yeung, Y., Chen, J., Xue, F., Sun, W.: Defocus blur detection based on multiscale svd fusion in gradient domain. J. Visual Commun. Image Represent. 59, 52\u201361 (2019)","journal-title":"J. Visual Commun. Image Represent."},{"key":"885_CR53","first-page":"37","volume":"43","author":"Z Xie","year":"2018","unstructured":"Xie, Z., Lu, W., Liu, X., Xue, Y., Yeung, Y.: Copy-move detection of digital audio based on multi-feature decision. J. Inf. Security Appl. 43, 37\u201346 (2018)","journal-title":"J. Inf. Security Appl."},{"key":"885_CR54","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.jvcir.2019.01.023","volume":"59","author":"Z Xu","year":"2019","unstructured":"Xu, Z., Lu, W., Zhang, Q., Yeung, Y., Chen, X.: Gait recognition based on capsule network. J. Visual Commun. Image Represent. 59, 159\u2013167 (2019)","journal-title":"J. Visual Commun. Image Represent."},{"key":"885_CR55","doi-asserted-by":"crossref","unstructured":"Xue, Y., Liu, W., Lu, W., Yeung, Y., Liu, X., Liu, H.: Efficient halftone image stegnography based on dispersion degree optimization. J. Real-Time Image Processing (2018)","DOI":"10.1007\/s11554-018-0822-8"},{"issue":"3","key":"885_CR56","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/TMM.2006.887990","volume":"9","author":"H Yang","year":"2007","unstructured":"Yang, H., Kot, A.C.: Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimed. 9(3), 475\u2013486 (2007)","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"885_CR57","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TMM.2008.917404","volume":"10","author":"H Yang","year":"2008","unstructured":"Yang, H., Kot, A.C., Rahardja, S.: Orthogonal data embedding for binary images in morphological transform domain\u2014a high-capacity approach. IEEE Trans. Multimed. 10(3), 339\u2013351 (2008)","journal-title":"IEEE Trans. Multimed."},{"key":"885_CR58","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Z Yi","year":"2018","unstructured":"Yi, Z., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Processing 146, 99\u2013111 (2018)","journal-title":"Signal Processing"},{"key":"885_CR59","doi-asserted-by":"crossref","unstructured":"Yuan, Y., Lu, W., Feng, B., Jian, W.: Steganalysis with CNN using multi-channels filtered residuals. In: International Conference on Cloud Computing & Security (2017)","DOI":"10.1007\/978-3-319-68505-2_10"},{"issue":"5","key":"885_CR60","first-page":"23","volume":"3","author":"Y Yuan","year":"2017","unstructured":"Yuan, Y., Lu, W., Feng, B., Weng, J.: Online universal steganalysis system based on multiple pre-trained model. Chin. J. Netw. Inf. Security 3(5), 23\u201331 (2017)","journal-title":"Chin. J. Netw. Inf. Security"},{"key":"885_CR61","doi-asserted-by":"crossref","unstructured":"Yuan, Y., Lu, W., Feng, B., Weng, J.: Steganalysis with CNN using multi-channels filtered residuals. In: International Conference on Cloud Computing & Security, pp.\u00a0110\u2013120 (2017)","DOI":"10.1007\/978-3-319-68505-2_10"},{"key":"885_CR62","first-page":"453","volume-title":"Lecture Notes in Electrical Engineering","author":"Jinhua Zeng","year":"2016","unstructured":"Zeng, J., Lu, W., Yang, R., Qiu, X.: Practical tools for digital image forensic authentication. In: Advanced Multimedia and Ubiquitous Engineering, pp.\u00a0453\u2013459 (2016)"},{"issue":"20","key":"885_CR63","doi-asserted-by":"crossref","first-page":"26239","DOI":"10.1007\/s11042-018-5847-2","volume":"77","author":"F Zhang","year":"2018","unstructured":"Zhang, F., Lu, W., Liu, H., Fei, X.: Natural image deblurring based on l 0-regularization and kernel shape optimization. Multimed. Tools Appl. 77(20), 26239\u201326257 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"885_CR64","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1016\/j.jvcir.2018.12.038","volume":"58","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Lu, W., Yin, X., Liu, W., Yeung, Y.: Binary image steganography based on joint distortion measurement. J. Visual Commun. Image Represent. 58, 600\u2013605 (2019)","journal-title":"J. Visual Commun. Image Represent."},{"issue":"23","key":"885_CR65","doi-asserted-by":"crossref","first-page":"31239","DOI":"10.1007\/s11042-018-6230-z","volume":"77","author":"Q Zhang","year":"2018","unstructured":"Zhang, Q., Lu, W., Wang, R., Li, G.: Digital image splicing detection based on markov features in block DWT domain. Multimed. Tools Appl. 77(23), 31239\u201331260 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"885_CR66","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.jvcir.2016.07.013","volume":"40","author":"Q Zhang","year":"2016","unstructured":"Zhang, Q., Lu, W., Weng, J.: Joint image splicing detection in DCT and contourlet transform domain. J. Visual Commun. Image Represent. 40, 449\u2013458 (2016)","journal-title":"J. Visual Commun. Image Represent."},{"issue":"11","key":"885_CR67","doi-asserted-by":"crossref","first-page":"3135","DOI":"10.1109\/TCYB.2017.2760883","volume":"48","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Zheng, L., Weng, J., Mao, Y., Lu, W., Xiao, L.: Multi-gait recognition based on attribute discovery. IEEE Trans. Cybern. 48(11), 3135\u20133148 (2018)","journal-title":"IEEE Trans. Cybern."},{"issue":"1","key":"885_CR68","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Security 12(1), 48\u201363 (2017)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"2","key":"885_CR69","doi-asserted-by":"crossref","first-page":"155014771769417","DOI":"10.1177\/1550147717694172","volume":"13","author":"Z Zhou","year":"2017","unstructured":"Zhou, Z., Wu, Q.M.J., Huang, F., Sun, X.: Fast and accurate near-duplicate image elimination for visual sensor networks. Int. J. Distrib. Sensor Netw. 13(2), 155014771769417 (2017)","journal-title":"Int. J. Distrib. Sensor Netw."},{"issue":"6","key":"885_CR70","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1587\/transinf.2015EDP7341","volume":"99","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Yang, C., Chen, B., Sun, X., Liu, Q., Wu, Q.M.J.: Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inf. Syst. 99(6), 1531\u20131540 (2016)","journal-title":"IEICE Trans. Inf. Syst."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00885-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00885-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00885-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T23:12:16Z","timestamp":1590621136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00885-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,29]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["885"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00885-8","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2019,5,29]]},"assertion":[{"value":"22 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}