{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:37:33Z","timestamp":1762004253232,"version":"3.38.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T00:00:00Z","timestamp":1288569600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s11633-010-0537-1","type":"journal-article","created":{"date-parts":[[2010,11,10]],"date-time":"2010-11-10T16:02:31Z","timestamp":1289404951000},"page":"531-542","source":"Crossref","is-referenced-by-count":5,"title":["Passive steganalysis based on higher order image statistics of curvelet transform"],"prefix":"10.1007","volume":"7","author":[{"given":"S.","family":"Geetha","sequence":"first","affiliation":[]},{"given":"Siva S.","family":"Sivatha Sindhu","sequence":"additional","affiliation":[]},{"given":"N.","family":"Kamaraj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,11]]},"reference":[{"issue":"7","key":"537_CR1","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F. A. P. Petitcolas","year":"1999","unstructured":"F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. Information hiding \u2014 A survey. In Proceedings of IEEE, vol. 87, no. 7, pp. 1062\u20131078, 1999.","journal-title":"Proceedings of IEEE"},{"key":"537_CR2","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"S. Katzenbeisser, F. A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking, Norwood, MA, USA: Artech House, 2000."},{"issue":"4","key":"537_CR3","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"W. Bender, D. Gruhl, N. Morimot, A. Lu. Techniques for data hiding. IBM Systems Journal, vol. 35, no. 4, pp. 313\u2013336, 1996.","journal-title":"IBM Systems Journal"},{"issue":"3","key":"537_CR4","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N. Nikolaidis","year":"1998","unstructured":"N. Nikolaidis, I. Pitas. Robust image watermarking in the spatial domain. Signal Processing, vol. 66, no. 3, pp. 385\u2013403, 1998.","journal-title":"Signal Processing"},{"key":"537_CR5","unstructured":"W. N. Lie, L. C. Chang. Data hiding in images with adaptive numbers of least significant bits based on human visual system. In Proceedings of IEEE International Conference on Image Processing, IEEE, Kobe, Japan, pp. 286\u2013290, 1999."},{"issue":"3","key":"537_CR6","first-page":"288","volume":"147","author":"Y. K. Lee","year":"2000","unstructured":"Y. K. Lee, L. H. Chen. High capacity image steganographic model. IEE Proceedings: Vision, Image and Signal Processing, vol. 147, no. 3, pp. 288\u2013294, 2000.","journal-title":"IEE Proceedings: Vision, Image and Signal Processing"},{"key":"537_CR7","first-page":"228","volume":"1","author":"W. N. Lie","year":"2000","unstructured":"W. N. Lie, G. S. Lin, C. L. Wu. Robust image watermarking on the DCT domain. In Proceedings of IEEE International Symposium on Circuits and Systems, Geneva, Switzerland, vol. 1, pp. 228\u2013231, 2000.","journal-title":"Proceedings of IEEE International Symposium on Circuits and Systems, Geneva, Switzerland"},{"issue":"8","key":"537_CR8","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1049\/el:19980545","volume":"34","author":"J. Huang","year":"1998","unstructured":"J. Huang, Y. Q. Shi. Adaptive image watermarking scheme based on visual masking. Electronics Letters, vol. 34, no. 8, pp. 748\u2013750, 1998.","journal-title":"Electronics Letters"},{"key":"537_CR9","doi-asserted-by":"crossref","unstructured":"T. Ogihara, D. Nakamura, N. Yokoya. Data embedding into pictorial with less distortion using discrete cosine transform. In Proceedings of International Conference on Pattern Recognition, Vienna, Austria, pp. 675\u2013679, 1996.","DOI":"10.1109\/ICPR.1996.546908"},{"issue":"12","key":"537_CR10","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. J. Cox","year":"1997","unstructured":"I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673\u20131687, 1997.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"537_CR11","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/6046.944472","volume":"3","author":"Q. Cheng","year":"2001","unstructured":"Q. Cheng, T. S. Huang. An additive approach to transformdomain information hiding and optimum detection structure. IEEE Transactions on Multimedia, vol. 3, no. 3, pp. 273\u2013284, 2001.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"4","key":"537_CR12","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TSP.2003.809368","volume":"51","author":"F. P\u00e9rez-Gonz\u00e1lez","year":"2003","unstructured":"F P\u00e9rez-Gonz\u00e1lez, F. Balado, J. R. H. Martin. Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 960\u2013980, 2003.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"537_CR13","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"C. I. Podilchuk","year":"1998","unstructured":"C. I. Podilchuk, W. Zeng. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525\u2013539, 1998.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"537_CR14","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1049\/el:19990327","volume":"35","author":"Y. S. Kim","year":"1999","unstructured":"Y. S. Kim, O. H. Kwon, R. H. Park. Wavelet based watermarking method for digital images using the human visual system. Electronics Letters, vol. 35, no. 6, pp. 466\u2013468, 1999.","journal-title":"Electronics Letters"},{"issue":"4","key":"537_CR15","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/s11633-007-0428-2","volume":"4","author":"X. Y. Wang","year":"2007","unstructured":"X. Y. Wang, J. Wu. A feature-based robust digital image watermarking against desynchronization attacks. International Journal of Automation and Computing, vol. 4, no. 4, pp. 428\u2013432, 2007.","journal-title":"International Journal of Automation and Computing"},{"key":"537_CR16","first-page":"815","volume-title":"Proceedings of ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing","author":"B. Xu","year":"2007","unstructured":"B. Xu, Z. B. Zhang, J. Z. Wang, X. Q. Liu. Improved BSS based schemes for Active steganalysis. In Proceedings of ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing, IEEE, Qingdao, PRC, vol. 3, pp. 815\u2013818, 2007."},{"key":"537_CR17","first-page":"67","volume":"3200","author":"J. Fridrich","year":"2005","unstructured":"J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Proceedings of International Workshop on Information Hiding, Lecture Notes in Computer Science, Springer, vol. 3200, pp. 67\u201381, 2005.","journal-title":"Proceedings of International Workshop on Information Hiding, Lecture Notes in Computer Science"},{"issue":"7","key":"537_CR18","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1016\/j.cose.2009.03.006","volume":"28","author":"S. Geetha","year":"2008","unstructured":"S. Geetha, S. S. Sivatha Sindhu, N. Kamaraj. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Computers & Security, vol. 28, no. 7, pp. 683\u2013697, 2008.","journal-title":"Computers & Security"},{"issue":"3","key":"537_CR19","first-page":"140","volume":"1","author":"S. Geetha","year":"2008","unstructured":"S. Geetha, S. S. Sivatha Sindhu, N. Kamaraj. Close color pair signature ensemble adaptive threshold based steganalysis for LSB embedding in digital images. Transactions on Data Privacy, vol. 1, no. 3, pp. 140\u2013161, 2008.","journal-title":"Transactions on Data Privacy"},{"key":"537_CR20","doi-asserted-by":"crossref","unstructured":"S. Geetha, S. S. S. Sindhu, N. Kamaraj. Steganalysis of LSB embedded images based on adaptive threshold close color pair signature. In Proceedings of the 6th IEEE Indian Conference on Computer Vision, Graphics and Image Processing, IEEE, pp. 281\u2013288, 2008.","DOI":"10.1109\/ICVGIP.2008.42"},{"key":"537_CR21","doi-asserted-by":"crossref","unstructured":"S. Geetha, S. S. S. Sindhu, N. Kamaraj. StegoBreaker: Defeating the steganographic systems through genetic-Xmeans approach using image quality metrics. In Proceedings of the 16th IEEE International Conference on Advanced Computing and Communication, IEEE, pp. 382\u2013391, 2008.","DOI":"10.1109\/ADCOM.2008.4760477"},{"key":"537_CR22","unstructured":"S. Geetha, S. S. S. Sindhu, N. Kamaraj. StegoCracker: A genetic algorithm tuned neural network paradigm for breaking the audio steganographic utilities. In Proceedings of IEEE Indicon, pp. 180\u2013186, 2007."},{"key":"537_CR23","first-page":"1","volume":"4675","author":"J. Fridrich","year":"2002","unstructured":"J. Fridrich, M. Goljan. Practical steganalysis of digital images \u2014 State of the art. In Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, USA, vol. 4675, pp. 1\u201313, 2002.","journal-title":"Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, USA"},{"key":"537_CR24","doi-asserted-by":"crossref","unstructured":"C. Manikopoulos, Y. Q. Shi, S. Song, Z. Zhang, Z. Ni, D. Zou. Detection of block DCT-based steganography in grayscale images. In Proceedings of the 5th IEEE Workshop on Multimedia Signal Processing, IEEE, pp. 355\u2013358, 2002.","DOI":"10.1109\/MMSP.2002.1203319"},{"key":"537_CR25","first-page":"14","volume":"4675","author":"R. Chandramouli","year":"2002","unstructured":"R. Chandramouli. A mathematical approach to steganalysis. In Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, USA, vol. 4675, pp. 14\u201325, 2002.","journal-title":"Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, USA"},{"key":"537_CR26","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1117\/12.476813","volume":"5020","author":"J. J. Harmsen","year":"2003","unstructured":"J. J. Harmsen, W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In Proceedings of the SPIE, vol. 5020, pp. 131\u2013142, 2003.","journal-title":"Proceedings of the SPIE"},{"issue":"2","key":"537_CR27","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I. Avcibas","year":"2003","unstructured":"I. Avcibas, N. Memon, B. Sankur. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221\u2013229, 2003.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"6","key":"537_CR28","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1109\/TMM.2005.858377","volume":"7","author":"W. N. Lie","year":"2005","unstructured":"W. N. Lie, G. S. Lin. A feature-based classification technique for blind image steganalysis. IEEE Transactions on Multimedia, vol. 7, no. 6, pp. 1007\u20131020, 2005.","journal-title":"IEEE Transactions on Multimedia"},{"key":"537_CR29","doi-asserted-by":"crossref","unstructured":"H. Farid. Detecting hidden messages using higher-order statistical models. In Proceedings of International Conference on Image Processing, Rochester, NY, USA, pp. 905\u2013908, 2002.","DOI":"10.1109\/ICIP.2002.1040098"},{"key":"537_CR30","volume-title":"Steganalysis of Additive Noise Modelable Information Hiding","author":"J. J. Harmsen","year":"2003","unstructured":"J. J. Harmsen. Steganalysis of Additive Noise Modelable Information Hiding, Master dissertation, Rensselaer Polytechnic Institute, Troy, New York, USA, 2003."},{"key":"537_CR31","doi-asserted-by":"crossref","unstructured":"T. Holotyak, J. Fridrich, S. Voloshynovskiy. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. Lecture Notes in Computer Science, Springer, pp. 273\u2013274, 2005.","DOI":"10.1007\/11552055_31"},{"key":"537_CR32","first-page":"768","volume":"1","author":"Y. Q. Shi","year":"2005","unstructured":"Y. Q. Shi, G. Xuan, C. Yang, J. Gao, Z. Zhang, P. Chai, D. Zou, C. Chen, W. Chen. Effective steganalysis based on statistical moments of wavelet characteristic function. In Proceedings of IEEE International Conference on Information Technology: Coding and Computing, IEEE, vol. 1, pp. 768\u2013773, 2005.","journal-title":"Proceedings of IEEE International Conference on Information Technology: Coding and Computing"},{"issue":"2","key":"537_CR33","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1002\/cpa.10116","volume":"57","author":"E. J. Candes","year":"2004","unstructured":"E. J. Candes, D. L. Donoho. New tight frames of curvelets and optimal representations of objects with C2 singularities. Communications on Pure and Applied Mathematics, vol. 57, no. 2, pp. 219\u2013266, 2004.","journal-title":"Communications on Pure and Applied Mathematics"},{"key":"537_CR34","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-1-4612-2544-7_9","volume":"103","author":"R. R. Coifman","year":"1995","unstructured":"R. R. Coifman, D. L. Donoho. Translation-invariant denoising. Lecture Notes in Statistics, Springer, vol. 103, pp. 125\u2013150, 1995.","journal-title":"Lecture Notes in Statistics"},{"issue":"6","key":"537_CR35","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1109\/TIP.2002.1014998","volume":"11","author":"J. L. Starck","year":"2001","unstructured":"J. L. Starck, E. J. Candes, D. L. Donoho. The curvelet transform for image denoising. IEEE Transactions on Image Processing, vol. 11, no. 6, pp. 670\u2013684, 2001.","journal-title":"IEEE Transactions on Image Processing"},{"key":"537_CR36","unstructured":"E. J. Candes, D. L. Donoho, C. R. A. Cohen, L. L. Schumaker. Curvelets \u2014 A surprisingly effective nonadaptive representation for objects with edges. Curves Surfaces, Nashville, TN, USA, pp. 105\u2013120, 2000."},{"key":"537_CR37","first-page":"45","volume-title":"Proceedings of International Conference on Image Processing","author":"N. Kingsbury","year":"2003","unstructured":"N. Kingsbury, T. Reves. Redundant representation with complex wavelets: How to achieve sparsity. In Proceedings of International Conference on Image Processing, IEEE, Barcelona, Spain, vol. 1, pp. 45\u201348, 2003."},{"issue":"1\u20132","key":"537_CR38","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/S0004-3702(02)00190-X","volume":"137","author":"Z. H. Zhou","year":"2002","unstructured":"Z. H. Zhou, J. Wu, W. Tang. Ensembling neural networks: Many could be better than all. Artificial Intelligence, vol. 137, no. 1\u20132, pp. 239\u2013263, 2002.","journal-title":"Artificial Intelligence"},{"key":"537_CR39","volume-title":"C4.5: Programs for Machine Learning","author":"J. R. Quinlan","year":"1993","unstructured":"J. R. Quinlan. C4.5: Programs for Machine Learning, San Mateo, CA, USA: Morgan Kaufmann, 1993."},{"issue":"4","key":"537_CR40","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1007\/s11633-009-0406-y","volume":"6","author":"S. S. S. Sindhu","year":"2009","unstructured":"S. S. S. Sindhu, S. Geetha, M. Marikannan, A. Kannan. A neuro-genetic based short-term forecasting framework for network intrusion prediction system. International Journal of Automation and Computing, vol. 6, no. 4, pp. 406\u2013414, 2009.","journal-title":"International Journal of Automation and Computing"},{"issue":"8","key":"537_CR41","first-page":"515","volume":"15","author":"Z. H. Zhou","year":"2002","unstructured":"Z. H. Zhou, Z. Q. Chen. Hybrid decision tree. Knowledgebased Systems, vol. 15, no. 8, pp. 515\u2013528, 2002.","journal-title":"Knowledgebased Systems"},{"issue":"6","key":"537_CR42","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1109\/TKDE.2004.11","volume":"16","author":"Z. H. Zhou","year":"2004","unstructured":"Z. H. Zhou, Y. Jiang. NeC4.5: Neural ensemble based C4.5. IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 6, pp. 770\u2013773, 2004.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"537_CR43","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-4541-9","volume-title":"An Introduction to the Bootstrap","author":"B. Efron","year":"1993","unstructured":"B. Efron, R. Tibshirani, R. J. Tibshirani. An Introduction to the Bootstrap, New York, USA: Chapman & Hall, 1993."},{"issue":"2","key":"537_CR44","first-page":"123","volume":"24","author":"L. Breiman","year":"1996","unstructured":"L. Breiman. Bagging predictors. Machine Learning, vol. 24, no. 2, pp. 123\u2013140, 1996.","journal-title":"Machine Learning"},{"key":"537_CR45","unstructured":"PictureMarc, EmbedWatermark, v 1.00.45, Digimarc Corp."},{"key":"537_CR46","unstructured":"M. Kutterand, F. Jordan. JK-PGS (Pretty Good Signature), Signal Processing Laboratory at Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, [Online], Available: http:\/\/ltswww.epfl.ch\/~kutter\/watermarking\/JK_PGS.html , 1998."},{"issue":"12","key":"537_CR47","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. J. Cox","year":"1997","unstructured":"I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673\u20131687, 1997.","journal-title":"IEEE Transactions on Image Processing"},{"key":"537_CR48","unstructured":"A. Brown. S-tools Version 4.0, [Online], Available: http:\/\/members.tripod.com\/steganography\/stego\/s-tools4.html ."},{"key":"537_CR49","unstructured":"Steganos Security Suite, [Online], Available: http:\/\/www.steganos.com\/english\/steganos\/download.htm ."},{"key":"537_CR50","unstructured":"J Korejwa. Shell 2.0, [Online], Available: http:\/\/www.tiac.net\/users\/korejwa\/steg.htm ."},{"key":"537_CR51","unstructured":"Images. [Online], Available: http:\/\/www.cl.cam.ac.uk\/~fapp2\/watermarking\/benchmark\/image_database.html ."},{"key":"537_CR52","unstructured":"J. H. Holland. Adaptation in Natural and Artificial Systems, University of Michigan Press, 1975."},{"key":"537_CR53","unstructured":"NeC45.zip, [Online], Available: http:\/\/lamda.nju.edu.cn\/datacode\/NeC4.5\/nec45.zip ."}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-010-0537-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-010-0537-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-010-0537-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T18:47:48Z","timestamp":1740682068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-010-0537-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["537"],"URL":"https:\/\/doi.org\/10.1007\/s11633-010-0537-1","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"type":"print","value":"1476-8186"},{"type":"electronic","value":"1751-8520"}],"subject":[],"published":{"date-parts":[[2010,11]]}}}