{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:25:37Z","timestamp":1771237537164,"version":"3.50.1"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T00:00:00Z","timestamp":1570147200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T00:00:00Z","timestamp":1570147200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872219"],"award-info":[{"award-number":["61872219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00915-5","type":"journal-article","created":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T06:36:01Z","timestamp":1570170961000},"page":"149-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Deep learning for real-time image steganalysis: a survey"],"prefix":"10.1007","volume":"17","author":[{"given":"Feng","family":"Ruan","sequence":"first","affiliation":[]},{"given":"Xing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhanyang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Lianyong","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,4]]},"reference":[{"key":"915_CR1","unstructured":"Tang, Y.-H., Jiang, L.-H., He, H.-Q., Dong, W.-Y.: A review on deep learning based image steganalysis. In: 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1764\u20131770. IEEE, (2018)"},{"issue":"2","key":"915_CR2","first-page":"142","volume":"2","author":"B Li","year":"2011","unstructured":"Li, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. J. Inf. Hiding Multimed. Signal Process. 2(2), 142\u2013172 (2011)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"issue":"9","key":"915_CR3","doi-asserted-by":"crossref","first-page":"10437","DOI":"10.1007\/s11042-017-4440-4","volume":"77","author":"W Songtao","year":"2018","unstructured":"Songtao, W., Zhong, S., Liu, Y.: Deep residual learning for image steganalysis. Multimed. Tools Appl. 77(9), 10437\u201310453 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"915_CR4","doi-asserted-by":"crossref","unstructured":"Nutzinger, M., Poisel, R.: Software architecture for real-time steganography in auditive media. In: 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON), pp. 100\u2013105. IEEE, (2010)","DOI":"10.1109\/SIBIRCON.2010.5555319"},{"issue":"1","key":"915_CR5","first-page":"30","volume":"9","author":"AZ Al-Othmani","year":"2012","unstructured":"Al-Othmani, A.Z., Manaf, A.A., Zeki, A.M.: A survey on steganography techniques in real time audio signals and evaluation. Int. J. Comput. Sci. Issues (IJCSI) 9(1), 30 (2012)","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"issue":"8","key":"915_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078","volume":"2016","author":"L Pibre","year":"2016","unstructured":"Pibre, L., Pasquet, J., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. Electron. Imaging 2016(8), 1\u201311 (2016)","journal-title":"Electron. Imaging"},{"key":"915_CR7","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 2752\u20132756. IEEE, (2016)","DOI":"10.1109\/ICIP.2016.7532860"},{"key":"915_CR8","doi-asserted-by":"publisher","unstructured":"Qi, L., Chen, Y., Yuan, Y., Fu, S., Zhang, X., Xu, X.: A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web (2019). \nhttps:\/\/doi.org\/10.1007\/s11280-019-00684-y","DOI":"10.1007\/s11280-019-00684-y"},{"key":"915_CR9","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.ins.2018.11.030","volume":"480","author":"L Qi","year":"2019","unstructured":"Qi, L., Wang, R., Chunhua, H., Li, S., He, Q., Xiaolong, X.: Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480, 354\u2013364 (2019)","journal-title":"Inf. Sci."},{"issue":"11","key":"915_CR10","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"915_CR11","doi-asserted-by":"crossref","unstructured":"Chanu, Y.J., Tuithung, T., Singh, K.M.: A short survey on image steganography and steganalysis techniques. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science, pp. 52\u201355. IEEE, (2012)","DOI":"10.1109\/NCETACS.2012.6203297"},{"key":"915_CR12","doi-asserted-by":"crossref","unstructured":"Al-Afandy, K.A., Faragallah, O.S., ELmhalawy, A., El-Rabaie, El-Sayed,\u00a0M., El-Banby, G.M.: High security data hiding using image cropping and LSB least significant bit steganography. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 400\u2013404. IEEE, (2016)","DOI":"10.1109\/CIST.2016.7805079"},{"key":"915_CR13","unstructured":"Jois, A., Tejaswini, L.: Survey on LSB data hiding techniques. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 656\u2013660. IEEE, (2016)"},{"key":"915_CR14","unstructured":"Jun, K.X., Jun, D.L., Yun, W.: Research on an information hiding algorithm base on most significant bit in image. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol.\u00a03, pp. V3\u2013372. IEEE, (2010)"},{"key":"915_CR15","unstructured":"Bing, F., Xiansan, Z.: Information hiding technique in most significant bit of still image. In: 2009 International Conference on image analysis and signal processing, pp. 74\u201376. IEEE, (2009)"},{"issue":"14","key":"915_CR16","doi-asserted-by":"crossref","first-page":"8319","DOI":"10.1007\/s11042-015-2752-9","volume":"75","author":"TD Nguyen","year":"2016","unstructured":"Nguyen, T.D., Arch-Int, S., Arch-Int, N.: An adaptive multi bit-plane image steganography using block data-hiding. Multimed. Tools Appl. 75(14), 8319\u20138345 (2016)","journal-title":"Multimed. Tools Appl."},{"key":"915_CR17","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: International Conference on Cloud Computing and Security, pp. 123\u2013132. Springer (2015)","DOI":"10.1007\/978-3-319-27051-7_11"},{"key":"915_CR18","doi-asserted-by":"crossref","unstructured":"Li, L., Luo, B., Li, Q., Fang, X.: A color images steganography method by multiple embedding strategy based on sobel operator. In: 2009 International Conference on multimedia information networking and security, vol.\u00a02, pp. 118\u2013121. IEEE (2009)","DOI":"10.1109\/MINES.2009.187"},{"key":"915_CR19","unstructured":"Singh, A., Singh, H.: An improved LSB based image steganography technique for RGB images. In: 2015 IEEE International Conference on electrical, computer and communication technologies (ICECCT), pp. 1\u20134. IEEE, (2015)"},{"key":"915_CR20","unstructured":"Potdar, V.M., Han, S., Chang, E.: Fingerprinted secret sharing steganography for robustness against image cropping attacks. In: INDIN\u201905. 2005 3rd IEEE International Conference on industrial informatics, 2005., pp. 717\u2013724. IEEE, (2005)"},{"key":"915_CR21","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian\/Arabic text steganography. In: 5th IEEE\/ACIS International Conference on Computer and Information Science and 1st IEEE\/ACIS International Workshop on component-based software engineering, software architecture and reuse (ICIS-COMSAR\u201906), pp. 310\u2013315. IEEE, (2006)"},{"issue":"2","key":"915_CR22","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","volume":"31","author":"K-H Jung","year":"2009","unstructured":"Jung, K.-H., Yoo, K.-Y.: Data hiding method using image interpolation. Comput. Stand. Interfaces 31(2), 465\u2013470 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"915_CR23","unstructured":"Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: 2009 International Conference on computer engineering and technology, vol.\u00a01, pp. 588\u2013592. IEEE, (2009)"},{"key":"915_CR24","doi-asserted-by":"crossref","unstructured":"McKeon, R.T.: Strange Fourier steganography in movies. In: 2007 IEEE International Conference on Electro\/Information Technology, pp. 178\u2013182. IEEE, (2007)","DOI":"10.1109\/EIT.2007.4374540"},{"key":"915_CR25","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"Andreas Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2014a steganographic algorithm. In: International Workshop on Information Hiding, pp. 289\u2013302. Springer, Berlin (2001)"},{"issue":"5","key":"915_CR26","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1007\/s13042-016-0610-3","volume":"9","author":"RR Chhikara","year":"2018","unstructured":"Chhikara, R.R., Sharma, P., Singh, L.: An improved dynamic discrete firefly algorithm for blind image steganalysis. Int. J. Mach. Learn. Cybern. 9(5), 821\u2013835 (2018)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"9","key":"915_CR27","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1109\/TIFS.2015.2434600","volume":"10","author":"B Li","year":"2015","unstructured":"Li, B., Wang, M., Li, X., Tan, S., Huang, J.: A strategy of clustering modification directions in spatial image steganography. IEEE Trans. Inf. Forensics Secur. 10(9), 1905\u20131917 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"915_CR28","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","volume":"67","author":"X Liao","year":"2018","unstructured":"Liao, X., Yin, J., Guo, S., Li, X., Sangaiah, A.K.: Medical jpeg image steganography based on preserving inter-block dependencies. Comput. Electr. Eng. 67, 320\u2013329 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"915_CR29","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Information Hiding","author":"Andreas Westfeld","year":"2000","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: International workshop on information hiding, pp. 61\u201376. Springer, Berlin (1999)"},{"key":"915_CR30","unstructured":"Farid, H.: Detecting hidden messages using higher-order statistical models. In: Proceedings International Conference on Image Processing, vol.\u00a02, pp. II\u2013II. IEEE, (2002)"},{"key":"915_CR31","doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: International Workshop on information hiding, pp. 340\u2013354. Springer, (2002)","DOI":"10.1007\/3-540-36415-3_22"},{"key":"915_CR32","unstructured":"Fridrich, J., Long, M.: Steganalysis of LSB encoding in color images. In: 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No. 00TH8532), vol.\u00a03, pp. 1279\u20131282. IEEE, (2000)"},{"key":"915_CR33","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 27\u201330. ACM, (2001)","DOI":"10.1145\/1232454.1232466"},{"key":"915_CR34","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.jvcir.2016.12.003","volume":"44","author":"FG Mohammadi","year":"2017","unstructured":"Mohammadi, F.G., Sajedi, H.: Region based image steganalysis using artificial bee colony. J. Vis. Commun. Image Represent. 44, 214\u2013226 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"10","key":"915_CR35","first-page":"1","volume":"9","author":"JA Christaline","year":"2016","unstructured":"Christaline, J.A., Ramesh, R., Vaishali, D.: Bio-inspired computational algorithms for improved image steganalysis. Indian J. Sci. Technol. 9(10), 1\u201310 (2016)","journal-title":"Indian J. Sci. Technol."},{"key":"915_CR36","doi-asserted-by":"crossref","unstructured":"Abdulrahman, H., Chaumont, M., Montesinos, P., Magnier, B.: Color image steganalysis based on steerable gaussian filters bank. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 109\u2013114. ACM, (2016)","DOI":"10.1145\/2909827.2930799"},{"issue":"1","key":"915_CR37","doi-asserted-by":"crossref","first-page":"78","DOI":"10.4018\/IJDCF.2019010106","volume":"11","author":"P Zhong","year":"2019","unstructured":"Zhong, P., Li, M., Kai, M., Wen, J., Xue, Y.: Image steganalysis in high-dimensional feature spaces with proximal support vector machine. Int. J. Digit. Crime Forensics (IJDCF) 11(1), 78\u201389 (2019)","journal-title":"Int. J. Digit. Crime Forensics (IJDCF)"},{"key":"915_CR38","doi-asserted-by":"crossref","unstructured":"Ni, D., Feng, G., Shen, L., Zhang, X.: Selective ensemble classification of image steganalysis via deep q network. IEEE Signal Processing Letters (2019)","DOI":"10.1109\/LSP.2019.2913018"},{"issue":"1","key":"915_CR39","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s11554-016-0600-4","volume":"14","author":"C Xia","year":"2018","unstructured":"Xia, C., Guan, Q., Zhao, X., Zhao, C.: Highly accurate real-time image steganalysis based on GPU. J. Real-Time Image Proc. 14(1), 223\u2013236 (2018)","journal-title":"J. Real-Time Image Proc."},{"key":"915_CR40","doi-asserted-by":"crossref","unstructured":"Ehrlich, M., Davis, L.: Deep residual learning in the JPEG transform domain. arXiv preprint. \narXiv:1812.11690\n\n (2018)","DOI":"10.1109\/ICCV.2019.00358"},{"issue":"6","key":"915_CR41","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/LSP.2018.2818674","volume":"25","author":"H Xianglei","year":"2018","unstructured":"Xianglei, H., Ni, J., Shi, Y.-Q.: Efficient jpeg steganography using domain transformation of embedding entropy. IEEE Signal Process. Lett. 25(6), 773\u2013777 (2018)","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"915_CR42","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"915_CR43","doi-asserted-by":"crossref","first-page":"9314","DOI":"10.1109\/ACCESS.2019.2891247","volume":"7","author":"X Duan","year":"2019","unstructured":"Duan, X., Jia, K., Li, B., Guo, D., Zhang, E., Qin, C.: Reversible image steganography scheme based on a u-net structure. IEEE Access 7, 9314\u20139323 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"915_CR44","first-page":"33","volume":"8","author":"M Sheikhan","year":"2016","unstructured":"Sheikhan, M.: Hybrid of evolutionary and swarm intelligence algorithms for prosody modeling in natural speech synthesis. Int. J. Inf. Commun. Technol. Res. 8(2), 33\u201344 (2016)","journal-title":"Int. J. Inf. Commun. Technol. Res."},{"key":"915_CR45","doi-asserted-by":"crossref","unstructured":"Sheikhan, M.: Synthesizing suprasegmental speech information using hybrid of GA-ACO and dynamic neural network. In: The 5th Conference on Information and Knowledge Technology, pp. 175\u2013180. IEEE, (2013)","DOI":"10.1109\/IKT.2013.6620060"},{"key":"915_CR46","unstructured":"Ren, Y., Liu, D., Xiong, Q., Fu, J., Wang, L.: Spec-resnet: a general audio steganalysis scheme based on deep residual network of spectrogram. arXiv preprint. \narXiv:1901.06838\n\n (2019)"},{"key":"915_CR47","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1007\/s11554-019-00849-y","volume":"16","author":"Y Sun","year":"2019","unstructured":"Sun, Y., Zhang, H., Zhang, T., Wang, R.: Deep neural networks for efficient steganographic payload location. J. Real Time Image Process.  16, 635 (2019)","journal-title":"J. Real Time Image Process"},{"key":"915_CR48","unstructured":"Aditya, K., Grzonkowski, S., Lekhac, N.: Enabling trust in deep learning models: a digital forensics case study. In: 2018 17th IEEE International Conference On Trust, Security and Privacy In Computing and Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 1250\u20131255. IEEE (2018)"},{"key":"915_CR49","first-page":"265","volume-title":"Cloud Computing and Security","author":"Shiyu Li","year":"2018","unstructured":"Li, S., Ye, D., Jiang, S., Liu, C., Niu, X., Luo, X.: Attack on deep steganalysis neural networks. In: International Conference on Cloud Computing and Security, pp. 265\u2013276. Springer, Berlin (2018)"},{"key":"915_CR50","doi-asserted-by":"crossref","unstructured":"Liu, J., Zhang, W., Zhang, Y., Hou, D., Liu, Y., Zha, H., Yu, N.: Detection based defense against adversarial examples from the steganalysis point of view. In: Proceedings of the IEEE Conference on computer vision and pattern recognition, pp. 4825\u20134834 (2019)","DOI":"10.1109\/CVPR.2019.00496"},{"key":"915_CR51","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/978-3-319-46475-6_25","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Chao Dong","year":"2016","unstructured":"Dong, C., Loy, C.C., Tang, X.: Accelerating the super-resolution convolutional neural network. In: European Conference on computer vision, pp. 391\u2013407. Springer, Berlin (2016)"},{"key":"915_CR52","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/978-3-319-46493-0_32","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Mohammad Rastegari","year":"2016","unstructured":"Rastegari, M., Ordonez, V., Redmon, J., Farhadi, A.: Xnor-net: imagenet classification using binary convolutional neural networks. In: European Conference on computer vision, pp. 525\u2013542. Springer, Berlin (2016)"},{"issue":"11","key":"915_CR53","doi-asserted-by":"crossref","first-page":"2616","DOI":"10.1109\/JSAC.2017.2760458","volume":"35","author":"L Qi","year":"2017","unstructured":"Qi, L., Zhang, X., Dou, W., Ni, Q.: A distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J. Sel. Areas Commun. 35(11), 2616\u20132624 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"915_CR54","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media watermarking, security, and forensics 2015, vol. 9409, pp. 94090J. International Society for Optics and Photonics (2015)","DOI":"10.1117\/12.2083479"},{"key":"915_CR55","doi-asserted-by":"crossref","unstructured":"Gatys, L.A., Ecker, A.S., Bethge, M.: Image style transfer using convolutional neural networks. In: Proceedings of the IEEE Conference on computer vision and pattern recognition, pp. 2414\u20132423 (2016)","DOI":"10.1109\/CVPR.2016.265"},{"key":"915_CR56","unstructured":"Wu, Y., Li, H., Yi, J.: Steganalysis using unsupervised end-to-end CNN fused with residual image. In: 2018 11th International Congress on image and signal processing, biomedical engineering and informatics (CISP-BMEI), pp. 1\u20135. IEEE, (2018)"},{"key":"915_CR57","unstructured":"Wu, S., Zhong, S., Liu, Y.: A novel convolutional neural network for image steganalysis with shared normalization. arXiv preprint: \narXiv:1711.07306\n\n (2017)"},{"key":"915_CR58","doi-asserted-by":"crossref","unstructured":"Yu, X., Tan, H., Liang, H., Li, C.-T., Liao, G.: A multi-task learning CNN for image steganalysis. In: 2018 IEEE International Workshop on information forensics and security (WIFS), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630766"},{"issue":"5","key":"915_CR59","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/LSP.2018.2816569","volume":"25","author":"B Li","year":"2018","unstructured":"Li, B., Wei, W., Ferreira, A., Tan, S.: Rest-net: diverse activation modules and parallel subnets-based cnn for spatial image steganalysis. IEEE Signal Process. Lett. 25(5), 650\u2013654 (2018)","journal-title":"IEEE Signal Process. Lett."},{"issue":"15","key":"915_CR60","doi-asserted-by":"crossref","first-page":"19633","DOI":"10.1007\/s11042-017-5326-1","volume":"77","author":"Y Qian","year":"2018","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Feature learning for steganalysis using convolutional neural networks. Multimed. Tools Appl. 77(15), 19633\u201319657 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"915_CR61","doi-asserted-by":"crossref","unstructured":"Ke, Q., Ming, L.D., Daxing, Z.: Image steganalysis via multi-column convolutional neural network. In: 2018 14th IEEE International Conference on signal processing (ICSP), pp. 550\u2013553. IEEE (2018)","DOI":"10.1109\/ICSP.2018.8652324"},{"key":"915_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, B., Su, J., Xiong, D., Lu, Y., Duan, H., Yao, J.: Shallow convolutional neural network for implicit discourse relation recognition. In: Proceedings of the 2015 Conference on empirical methods in natural language processing, pp. 2230\u20132235 (2015)","DOI":"10.18653\/v1\/D15-1266"},{"issue":"5","key":"915_CR63","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"X Guanshuo","year":"2016","unstructured":"Guanshuo, X., Han-Zhou, W., Shi, Y.-Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"915_CR64","doi-asserted-by":"crossref","unstructured":"Das, N.S., Rasmi, P.S.: Large-scale steganalysis using outlier detection method for image sharing application. In: 2015 International Conference on circuits, power and computing technologies [ICCPCT-2015], pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/ICCPCT.2015.7159320"},{"issue":"9","key":"915_CR65","doi-asserted-by":"crossref","first-page":"1424","DOI":"10.1109\/TIFS.2014.2336380","volume":"9","author":"AD Ker","year":"2014","unstructured":"Ker, A.D., Pevn\u1ef3, T.: The steganographer is the outlier: realistic large-scale steganalysis. IEEE Trans. Inf. Forensics Secur. 9(9), 1424\u20131435 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"915_CR66","doi-asserted-by":"crossref","unstructured":"Xu, X., Fu, S., Cai, Q., Tian, W., Liu, W., Dou, W., Sun, X., Liu, A.X.: Dynamic resource allocation for load balancing in fog environment. Wireless Communications and Mobile Computing, 2018 (2018)","DOI":"10.1155\/2018\/6421607"},{"key":"915_CR67","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Wu, J.Q.M., Sun, X.: Multiple distance-based coding: toward scalable feature matching for large-scale web image search. IEEE Transactions on Big Data (2019)","DOI":"10.1109\/TBDATA.2019.2919570"},{"key":"915_CR68","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07900-x","author":"X Xu","year":"2019","unstructured":"Xu, X., Chen, Y., Yuan, Y., Huang, T., Zhang, X., Qi, L.: Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multimed. Tools Appl. (2019). \nhttps:\/\/doi.org\/10.1007\/s11042-019-07900-x","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"915_CR69","first-page":"166","volume":"4","author":"X Xiaolong","year":"2015","unstructured":"Xiaolong, X., Dou, W., Zhang, X., Chen, J.: Enreal: an energy-aware resource allocation method for scientific workflow executions in cloud environment. IEEE Trans. Cloud Comput. 4(2), 166\u2013179 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"915_CR70","unstructured":"Xu, X., Zhang, X., Gao, H., Xue, Y., Qi, L., Dou, W.: Become: blockchain-enabled computation offloading for IOT in mobile edge computing. IEEE Trans. Ind. Inf. 1\u20131 (2019)"},{"issue":"1","key":"915_CR71","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C.-N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48\u201363 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"915_CR72","doi-asserted-by":"crossref","first-page":"31517","DOI":"10.1109\/ACCESS.2018.2889715","volume":"7","author":"Q Mo","year":"2018","unstructured":"Mo, Q., Dai, F., Liu, D., Qin, J., Xie, Z., Li, T.: Development of private processes: a refinement approach. IEEE Access 7, 31517\u201331534 (2018)","journal-title":"IEEE Access"},{"key":"915_CR73","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.jnca.2019.02.008","volume":"133","author":"X Xiaolong","year":"2019","unstructured":"Xiaolong, X., Li, Y., Huang, T., Xue, Y., Peng, K., Qi, L., Dou, W.: An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J. Netw. Comput. Appl. 133, 75\u201385 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"915_CR74","unstructured":"Xu, X., Zhang, X., Khan, M., Dou, W., Xue, S., Yu, S.: A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems. Future Gen. Comput. Syst. (2017)"},{"issue":"3","key":"915_CR75","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","volume":"19","author":"P Mach","year":"2017","unstructured":"Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628\u20131656 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"915_CR76","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MC.2016.145","volume":"49","author":"W Shi","year":"2016","unstructured":"Shi, W., Dustdar, S.: The promise of edge computing. Computer 49(5), 78\u201381 (2016)","journal-title":"Computer"},{"key":"915_CR77","doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, Q., Zhang, X., Zhang, J., Qi, L., Dou, W.: A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Trans. Comput. Soc. Syst. (2019)","DOI":"10.1109\/TCSS.2019.2909137"},{"key":"915_CR78","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.future.2019.01.012","volume":"96","author":"X Xiaolong","year":"2019","unstructured":"Xiaolong, X., Xue, Y., Qi, L., Yuan, Y., Zhang, X., Umer, T., Wan, S.: An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gen. Comput. Syst. 96, 89\u2013100 (2019)","journal-title":"Future Gen. Comput. Syst."},{"key":"915_CR79","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1016\/j.future.2018.12.055","volume":"95","author":"X Xiaolong","year":"2019","unstructured":"Xiaolong, X., Liu, Q., Luo, Y., Peng, K., Zhang, X., Meng, S., Qi, L.: A computation offloading method over big data for IOT-enabled cloud-edge computing. Future Gen. Comput. Syst. 95, 522\u2013533 (2019)","journal-title":"Future Gen. Comput. Syst."},{"key":"915_CR80","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.jnca.2018.09.006","volume":"124","author":"X Xiaolong","year":"2018","unstructured":"Xiaolong, X., Shucun, F., Qi, L., Zhang, X., Liu, Q., He, Q., Li, S.: An IOT-oriented data placement method with privacy preservation in cloud environment. J. Netw. Comput. Appl. 124, 148\u2013157 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"915_CR81","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data, pp. 37\u201342. ACM (2015)","DOI":"10.1145\/2757384.2757397"},{"key":"915_CR82","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.patrec.2017.08.013","volume":"109","author":"Z Zhou","year":"2018","unstructured":"Zhou, Z., Wu, Q.M.J., Sun, X.: Encoding multiple contextual clues for partial-duplicate image retrieval. Pattern Recogn. Lett. 109, 18\u201326 (2018)","journal-title":"Pattern Recogn. Lett."},{"key":"915_CR83","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1111\/coin.12197","volume":"35","author":"X Xu","year":"2019","unstructured":"Xu, X., Fu, S., Yuan, Y., Luo, Y., Qi, L., Lin, W., Dou, W.: Multiobjective computation offloading for workflow management in cloudlet-based mobile cloud using NSGA-II. Comput. Intell. 35, 476 (2019)","journal-title":"Comput. Intell."},{"key":"915_CR84","doi-asserted-by":"crossref","unstructured":"Xu, X., Huang, R., Dou, R., Li, Y., Zhang, J., Huang, T., Yu, W.: Energy-efficient cloudlet management for privacy preservation in wireless metropolitan area networks. Security and Communication Networks, 2018 (2018)","DOI":"10.1155\/2018\/8180451"},{"key":"915_CR85","doi-asserted-by":"crossref","unstructured":"Yi, S., Hao, Z., Qin, Z., Li, Q.: Fog computing: platform and applications. In: 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), pp. 73\u201378. IEEE (2015)","DOI":"10.1109\/HotWeb.2015.22"},{"key":"915_CR86","doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, X., Qi, L., Chen, Y., Ding, Z., Shi, J.: Energy-efficient virtual machine scheduling across cloudlets in wireless metropolitan area networks. Mobile Netw. Appl. 1\u201315 (2019)","DOI":"10.1007\/s11036-019-01242-6"},{"key":"915_CR87","doi-asserted-by":"crossref","unstructured":"Xu, X., Zhao, X., Ruan, F., Zhang, J., Tian, W., Dou, W., Liu, A.X.: Data placement for privacy-aware applications over big data in hybrid clouds. Secur. Commun. Netw. 2017, (2017)","DOI":"10.1155\/2017\/2376484"},{"issue":"13","key":"915_CR88","doi-asserted-by":"crossref","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Mu, Y., Wu, Q.M.J.: Coverless image steganography using partial-duplicate image retrieval. Soft. Comput. 23(13), 4927\u20134938 (2019)","journal-title":"Soft. Comput."},{"key":"915_CR89","doi-asserted-by":"crossref","unstructured":"Xu, X., Li, D., Dai, Z., Li, S., Chen, X.: A heuristic offloading method for deep learning edge services in 5g networks. IEEE Access (2019)","DOI":"10.1109\/ACCESS.2019.2918585"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00915-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00915-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00915-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T23:19:44Z","timestamp":1601680784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00915-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,4]]},"references-count":89,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["915"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00915-5","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,4]]},"assertion":[{"value":"1 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}