{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T18:24:01Z","timestamp":1765045441196},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,2,23]],"date-time":"2017-02-23T00:00:00Z","timestamp":1487808000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s12530-017-9174-z","type":"journal-article","created":{"date-parts":[[2017,2,23]],"date-time":"2017-02-23T12:18:22Z","timestamp":1487852302000},"page":"181-194","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A new feature extraction scheme in wavelet transform for stego image classification"],"prefix":"10.1007","volume":"9","author":[{"given":"Lakhdar","family":"Laimeche","sequence":"first","affiliation":[]},{"given":"Hayet Farida","family":"Merouani","sequence":"additional","affiliation":[]},{"given":"Smaine","family":"Mazouzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,23]]},"reference":[{"key":"9174_CR1","unstructured":"Anahita SH, Shahrokh G, Hamid SZ (2011) Universal steganalysis based on local prediction error in wavelet Domain. 7th international conference on intelligent information hiding and multimedia signal processing 165\u2013168"},{"key":"9174_CR2","first-page":"2749","volume":"17","author":"I Avcibas","year":"2005","unstructured":"Avcibas I, Kharrazib M, Memon N, Sankur B (2005) Image steganalysis with binary similarity measures. EURASIP JASP 17:2749\u20132757","journal-title":"EURASIP JASP"},{"key":"9174_CR3","doi-asserted-by":"crossref","unstructured":"Benguigui L, Blumenfeld LE (2007) Beyond the power law \u2013 a new\u00a0 approach to analyze city size distribution. Comput Environ Urban Syst 31(6):648\u2013666","DOI":"10.1016\/j.compenvurbsys.2006.11.002"},{"key":"9174_CR4","unstructured":"Bi A, Mraghni (1996) Spatial gray levels distribution based unsupervised texture segmentation. In: proceedings of 3rd international conference of signal processing (ICSP96), Pekin"},{"issue":"1","key":"9174_CR5","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forest. Mach Learn 45(1):532","journal-title":"Mach Learn"},{"key":"9174_CR6","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1364\/AO.26.000157","volume":"26","author":"GJ Burton","year":"1987","unstructured":"Burton GJ, Moorhead IR (1987) Color and spatial structure in natural scenes. J Appl Opt 26:157\u2013170","journal-title":"J Appl Opt"},{"key":"9174_CR7","doi-asserted-by":"crossref","unstructured":"Caron Y, Makris P, Vincent N (2007) Use of power law models in detecting region of interest. Pattern Recognit, Elsevier 40(9):2521\u20132529","DOI":"10.1016\/j.patcog.2007.01.004"},{"key":"9174_CR8","unstructured":"Caron Y, Makris P, Vincent N (2002) A method for detecting artificial objects. In natural environments. RFAI team publication international conference on pattern recognition ICPR 2002, Quebec 600\u2013603"},{"key":"9174_CR9","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1002\/cplx.6130010104","volume":"1","author":"JL Casti","year":"1995","unstructured":"Casti JL (1995) Bell curves and monkey languages. Complexity 1:12\u201315","journal-title":"Complexity"},{"key":"9174_CR10","unstructured":"Dekun Z, Yun QS, Wei S, Guorong X (2006) Steganalysis based on Markov model of threshold prediction-error image. In Proc. IEEE International Conference on Multimedia and Expo (ICME) 1365\u20131368"},{"key":"9174_CR11","doi-asserted-by":"crossref","unstructured":"Dellandrea E, Makris P, Boiron M, Vincent N (2002) A medical acoustic signal analysis method based on Zipf law. RFAI publication: international conference on digital signal processing. SANTORINI (GRECE) 2:615\u2013618","DOI":"10.1109\/ICDSP.2002.1028165"},{"issue":"7","key":"9174_CR12","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1002\/asi.20158","volume":"56","author":"L Egghe","year":"2005","unstructured":"Egghe L (2005) The power of power laws and an interpretation of Lotkaian informetric systems as self-similar fractals. J Am Soc Inf Sci Technol 56(7):669\u2013675","journal-title":"J Am Soc Inf Sci Technol"},{"key":"9174_CR13","doi-asserted-by":"crossref","unstructured":"Farid H (2002) Detecting hidden messages using higher-order statistical models. In Proc. IEEE international conference image processing 2:905\u2013908","DOI":"10.1109\/ICIP.2002.1040098"},{"issue":"3","key":"9174_CR14","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/LSP.2013.2240385","volume":"20","author":"L Fengyong","year":"2013","unstructured":"Fengyong L, Xinpeng Z, Bin C, Guorui F (2013) JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier. IEEE Signal Process Lett 20(3):233\u2013236","journal-title":"IEEE Signal Process Lett"},{"key":"9174_CR15","unstructured":"Gireesh KT, Jithin R, Deepa DS (2010) Feature based steganalysis using wavelet decomposition and magnitude statistics. In Proc. international conference on advances in computer engineering (ACE) 298\u2013300"},{"key":"9174_CR16","doi-asserted-by":"crossref","unstructured":"Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In Proc. SPIE Security and Watermarking of Multimedia Content VIII 6072:1\u201313","DOI":"10.1117\/12.643254"},{"key":"9174_CR17","unstructured":"Guoming C, Qiang C, Dong Z, Weighing Z (2012) Particle swarm optimization feature selection for image steganalysis. IEEE Computer Society, pp 304\u2013308"},{"key":"9174_CR18","doi-asserted-by":"crossref","unstructured":"Hamoud M, Merouani HF, Laimeche L (2014) The power laws: Zipf and inverse Zipf for automated segmentation and classification of masses within mammograms. Evolving systems. Springer, Berlin","DOI":"10.1007\/s12530-014-9116-y"},{"key":"9174_CR19","doi-asserted-by":"crossref","unstructured":"Holotyak T, Fridrich J, Voloshynovskiy S (2005) Blind statistical steganalysis of additive steganography using wavelet higher order statistics In Proc. 9th IFIP Conference on Communication and Multimedia Security LNCS 3677:273\u2013274","DOI":"10.1007\/11552055_31"},{"key":"9174_CR20","first-page":"12","volume":"41","author":"MS Jerome","year":"1993","unstructured":"Jerome MS (1993) Embedded Image Coding Using Zerotrees Of Wavelet Coefficients. IEEE Trans Signal Process 41:12","journal-title":"IEEE Trans Signal Process"},{"issue":"01","key":"9174_CR21","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TIFS.2006.890519","volume":"02","author":"AD Ker","year":"2007","unstructured":"Ker AD (2007) Steganalysis of embedding in two least-significant bits. IEEE Trans Inf Forensics Secur 02(01):46\u201354","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9174_CR22","unstructured":"Khalind SO, Aziz B (2013) Single-mismatch 2LSB embedding steganography. IEEE international symposium on signal processing and information technology (ISSPIT) 283\u2013286"},{"key":"9174_CR23","unstructured":"Kodovsky J (2012) JPEG-compatibility steganalysis using block-histogram of recompression artifacts. In: Proc. 14th information hiding conference Berkeley CA. Springer LNCS 7692:78\u201393"},{"issue":"2","key":"9174_CR24","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"9174_CR25","first-page":"0975","volume":"40","author":"L Laimeche","year":"2012","unstructured":"Laimeche L, Merouani HF (2012) A novel technique of steganalysis in uncompressed image through Zipf\u2019s law. IJCIA 40(6):0975\u20138887","journal-title":"IJCIA"},{"key":"9174_CR26","unstructured":"Lavalette D (1996) On a Zipf\u2019s law extension to impact factors. INSERM U350 institut curie\u2013Recherche, Bt 112, Centre Universitaire 91405, Orsay, France"},{"key":"9174_CR27","unstructured":"Lei S, Zhimin G, Lin Wand Yun S (2006) An applicative study of Zipf\u2019s law on web cache. Int J Inf Technol 12(24)"},{"issue":"1","key":"9174_CR28","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.patcog.2007.06.005","volume":"41","author":"QZ Liu","year":"2008","unstructured":"Liu QZ, Andrew HS, Chen ZX, Xu J (2008) Feature mining and pattern classification for steganalysis of LSBs matching steganography in grayscale images. Pattern Recognit 41(1):56\u201366","journal-title":"Pattern Recognit"},{"key":"9174_CR29","doi-asserted-by":"crossref","unstructured":"Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class vector support Machines. In: Proc. SPIE security, steganography and watermarking of multimedia contents 5306:35\u201345","DOI":"10.1117\/12.526012"},{"key":"9174_CR30","unstructured":"Martinez M G, Martinez R A, Del-Rio M B, Mansilla R (2009) Universality of rank-ordering distributions in the arts and sciences. Journal pone 0004791, Mandalena, costa, Harvard University"},{"key":"9174_CR31","unstructured":"Mun LK, Gerard L (2010) On the power law relationship of the critical transmitting range and the number of nodes of ad hoc networks. Int J Sensor Netw Indersceince 7(4):228\u2013235"},{"key":"9174_CR32","doi-asserted-by":"crossref","unstructured":"Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding\u2014a survey. In: Proc. IEEE special issue on protection of multimedia content, 87(7):1062\u20131078","DOI":"10.1109\/5.771065"},{"key":"9174_CR33","doi-asserted-by":"crossref","unstructured":"Pevny T, Fridrich J (2007) Merging markov and DCT feature for multi-class JPEG steganalysis. In: proc. SPIE electronic imaging, security, steganography, and watermarking of multimedia contents IX 6505","DOI":"10.1117\/12.696774"},{"key":"9174_CR34","unstructured":"Provos N (2001) Defending against statistical steganalysis. In: Proc. 10th USENIX Security Symposium 10: 323\u2013336"},{"key":"9174_CR35","volume-title":"Methods of multivariate analysis","author":"AC Rencher","year":"1995","unstructured":"Rencher AC (1995) Methods of multivariate analysis. Wiley, New York"},{"key":"9174_CR36","unstructured":"Robin AK, Sujaya R, Sudhira HS (2012) An approach to regional planning in India. Int J Syst Syst Eng Indersceince 3(2):117\u2013128"},{"key":"9174_CR37","unstructured":"Sahoo G, Rajesh KT (2012) Secure image transmission using steganographic methodologies. Int J Multimedia Intell Secur Indersceince 1:169\u2013190"},{"key":"9174_CR38","unstructured":"Shaohui L, Lin M, Hongxun Y, Debin Z (2009) Universal steganalysis based on statistical models using reorganization of block based DCT coefficients. 5th international conference on information assurance and security 778\u2013781"},{"key":"9174_CR39","doi-asserted-by":"crossref","unstructured":"Sheikhan M, Moin MS, Pezhmanpour M (2010) Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform. Intelligent Systems Design and Applications (ISDA) 10th International Conference 368\u2013372","DOI":"10.1109\/ISDA.2010.5687236"},{"key":"9174_CR40","doi-asserted-by":"crossref","unstructured":"Shi YQ, Xuan GR, Zuo DK (2005) Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image and neural network. In: Proc. IEEE International Conference on Multimedia Expo (ICME) 269\u2013272","DOI":"10.1109\/ICME.2005.1521412"},{"key":"9174_CR41","unstructured":"Shuang HZ, Hong BZ (2007) Blind steganalysis using wavelet statistics and ANOVA. In: Proc. International conference of machine learning and cybernetics 5:2515\u20132519"},{"key":"9174_CR42","doi-asserted-by":"crossref","unstructured":"Solanki K, Sarkar A, Manjunath BS (2007) YASS: Yet another Steganographic Scheme that resists blind steganalysis. In Proc. 9th information hiding workshop 16\u201331","DOI":"10.1007\/978-3-540-77370-2_2"},{"key":"9174_CR43","doi-asserted-by":"crossref","unstructured":"Vincent N, Makris P, Brodier M (2000) Compressed image quality and Zipf\u2019s law. In: International conference on signal processing (ICSP\u2013IFIC-IAPR WCC2000), Beijing (China) 1077\u20131084","DOI":"10.1109\/ICOSP.2000.891723"},{"issue":"1","key":"9174_CR44","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TIFS.2006.890517","volume":"2","author":"Y Wang","year":"2007","unstructured":"Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Forensics Secur 2(1):31\u201345","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9174_CR45","unstructured":"Westfeld A (2001) F5 a steganographic algorithm High capacity despite better steganalysis. Information hiding, in proceedings of the 4th international workshop, springer, Berlin, 289\u2013302"},{"key":"9174_CR46","doi-asserted-by":"crossref","unstructured":"Xiang Y, Zhang WH (2012) Effective steganalysis of YASS based on statistical moments of wavelet characteristic function and Markov process. In: Proc. international conference on computer science and electronics engineering 606\u2013610","DOI":"10.1109\/ICCSEE.2012.218"},{"key":"9174_CR47","unstructured":"Xiangyang L, Fenlin L, Jianming C, Yining Z (2008) Image universal steganalysis based on wavelet packet transforms. Multimedia Signal Processing: IEEE 10th Workshop on Digital 780\u2013784"},{"issue":"7","key":"9174_CR48","doi-asserted-by":"crossref","first-page":"1404","DOI":"10.1109\/JSAC.2011.110807","volume":"29","author":"L Xiangyang","year":"2011","unstructured":"Xiangyang L, Fenlin L, Shiguo L, Chunfang Y, Stefanos G (2011) On the typical statistic features for image blind steganalysis. IEEE J Sel Areas Commun 29(7):1404\u20131422","journal-title":"IEEE J Sel Areas Commun"},{"key":"9174_CR49","doi-asserted-by":"crossref","unstructured":"Xuan GR, Shi YQ, Gao JJ (2005) Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In Proc. 7th International Information Hiding Workshop LNCS 3727: 262\u2013277","DOI":"10.1007\/11558859_20"},{"key":"9174_CR50","volume-title":"Human behavior and the principle of least effort","author":"GK Zipf","year":"1949","unstructured":"Zipf GK (1949) Human behavior and the principle of least effort. Addison Wesley, New York"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12530-017-9174-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-017-9174-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-017-9174-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T00:47:56Z","timestamp":1568854076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12530-017-9174-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,23]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["9174"],"URL":"https:\/\/doi.org\/10.1007\/s12530-017-9174-z","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"value":"1868-6478","type":"print"},{"value":"1868-6486","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,23]]}}}