{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T04:31:15Z","timestamp":1749357075377},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T00:00:00Z","timestamp":1677196800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T00:00:00Z","timestamp":1677196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s12652-023-04559-z","type":"journal-article","created":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T07:02:52Z","timestamp":1677222172000},"page":"4401-4417","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An ensemble-based stegware detection system for information hiding malware attacks"],"prefix":"10.1007","volume":"14","author":[{"given":"A.","family":"Monika","sequence":"first","affiliation":[]},{"given":"R.","family":"Eswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,24]]},"reference":[{"issue":"260905","key":"4559_CR1","first-page":"11","volume":"2014","author":"J Bai","year":"2014","unstructured":"Bai J, Wang J, Zou G (2014) \u2018\u2018A malware detection scheme based on mining format information. Sci World J 2014(260905):11","journal-title":"Sci World J"},{"key":"4559_CR2","doi-asserted-by":"publisher","first-page":"5371","DOI":"10.1109\/ACCESS.2020.3048319","volume":"9","author":"L Caviglione","year":"2020","unstructured":"Caviglione L, Choras M (2020) Tight arms race: overview of current malware threats and trends in their detection. IEEE 9:5371\u20135396. https:\/\/doi.org\/10.1109\/ACCESS.2020.3048319","journal-title":"IEEE"},{"key":"4559_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108010","author":"L Caviglione","year":"2021","unstructured":"Caviglione L, Mazurczyk W, Repetto M, Schaffhauser A, Zuppelli M (2021) Kernel-level tracing for detecting stegomalware and covert channels in Linuxenvironments. Int J Comput Telecommun Netw. https:\/\/doi.org\/10.1016\/j.comnet.2021.108010","journal-title":"Int J Comput Telecommun Netw"},{"key":"4559_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13640-020-00533-3","volume":"2020","author":"M Chen","year":"2020","unstructured":"Chen M, Yang Y, Lei M, Dong Z (2020) Joint multi-domain feature learning for image steganalysis based on CNN. EURASIP J Image Video Process 2020:1\u20132","journal-title":"EURASIP J Image Video Process"},{"key":"4559_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02942-2","author":"P Chinnasamy","year":"2021","unstructured":"Chinnasamy P, Deepalakshmi P (2021) HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-021-02942-2","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4559_CR6","first-page":"256","volume":"8","author":"S Choudhury","year":"2019","unstructured":"Choudhury S, Amritha PP, Sethumadhavan M (2019) Stegware destruction using showering methods. Int J Innov Technol Explor Eng (IJITEE) 8:256\u2013259","journal-title":"Int J Innov Technol Explor Eng (IJITEE)"},{"key":"4559_CR7","first-page":"19997","volume":"8","author":"A Cohen","year":"2020","unstructured":"Cohen A, Nissim N, Elovici Y (2020) MalJPEG: machine learning based solution for detection of malicious JPEG images. Expert Syst Appl 8:19997\u201320011","journal-title":"Expert Syst Appl"},{"key":"4559_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991949","author":"S De Paula","year":"2020","unstructured":"De Paula S, Mendon\u00e7a (2020) Synthetic datasets generator for testing information visualization and machine learning techniques and tools. IEEE. https:\/\/doi.org\/10.1109\/ACCESS.2020.2991949","journal-title":"IEEE"},{"key":"4559_CR9","unstructured":"Fridrich J (2023) Steganographic algorithms. Stegware. http:\/\/dde.binghamton.edu\/download\/stego_algorithms\/"},{"key":"4559_CR10","doi-asserted-by":"publisher","first-page":"18007","DOI":"10.1007\/s11042-017-5134-7","volume":"77","author":"J Gan","year":"2018","unstructured":"Gan J, Liu J, Luo X, Yang C, Liu F (2018) Reliable steganalysis of HUGO steganography based on partially known plaintext. Multimed Tools Appl 77:18007\u201318027","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"4559_CR11","first-page":"2763","volume":"120","author":"G George","year":"2018","unstructured":"George G, Savaridassan P, Devi K (2018) Detect images embedded with malicious programs. Int J Pure Appl Math. 120(6):2763\u20132777","journal-title":"Int J Pure Appl Math."},{"key":"4559_CR12","doi-asserted-by":"publisher","first-page":"19681","DOI":"10.1007\/s11042-019-7285-1","volume":"78","author":"X Gu","year":"2019","unstructured":"Gu X, Guo J (2019) A study on subtractive pixel adjacency matrix features. Multimed Tools Appl 78:19681\u201319695","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"4559_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 2014(1):1","journal-title":"EURASIP J Inf Secur"},{"key":"4559_CR14","first-page":"29","volume-title":"7th international conference on reliability infocom technologies and optimization (ICRITO) (trends and future directions)","author":"J Kaur","year":"2018","unstructured":"Kaur J, Singh S (2018) Feature selection using mutual information and adaptive particle swarm optimization for image steganalysis. 7th international conference on reliability infocom technologies and optimization (ICRITO) (trends and future directions). IEEE, pp 29\u201331"},{"key":"4559_CR15","first-page":"1","volume":"7880","author":"J Kodovsky","year":"2011","unstructured":"Kodovsky J, Fridrich J (2011) Steganalysis in high dimensions fusing classifiers built on random subspaces. Proc SPIE Electr Imaging Secur Forensics Multimed XIII 7880:1\u201313","journal-title":"Proc SPIE Electr Imaging Secur Forensics Multimed XIII"},{"key":"4559_CR16","doi-asserted-by":"publisher","first-page":"4206","DOI":"10.1109\/ICIP.2014.7025854","volume-title":"IEEE international conference on image processing (ICIP)","author":"B Li","year":"2014","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. IEEE international conference on image processing (ICIP). IEEE, pp 4206\u20134210"},{"key":"4559_CR17","volume-title":"16th international conference on control automation robotics and vision (ICARCV)","author":"K Lichy","year":"2020","unstructured":"Lichy K, Lipinski P, Grzelak M (2020) Deep convolutional network for steganalysis of HUGO WOW and UNIWARD algorithms. 16th international conference on control automation robotics and vision (ICARCV). IEEE"},{"key":"4559_CR18","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/978-981-16-1395-1_46","volume-title":"Inventive systems and control","author":"A Monika","year":"2021","unstructured":"Monika A, Eswari R (2021) Ensemble-based stegomalware detection system for hidden ransomware attack. Inventive systems and control. Springer, Singapore, pp 599\u2013619"},{"key":"4559_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107990","author":"A Monika","year":"2022","unstructured":"Monika A, Eswari R (2022) \u2018Prevention of hidden information security attacks by neutralizing stego-malware. Comput Electr Eng. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107990","journal-title":"Comput Electr Eng"},{"key":"4559_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102247","author":"A Pinhero","year":"2021","unstructured":"Pinhero A, Anupama ML, Vinod P, Visaggioc CA, Aneesh N, Abhijith S, Krishnan A (2021) Malware detection employed by visualization and deep neural network. J Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2021.102247","journal-title":"J Comput Secur"},{"key":"4559_CR21","first-page":"2020","volume":"76\u20131","author":"SS Prasad","year":"2020","unstructured":"Prasad SS, Hadar O, Polian I (2020) Detection of malicious spatial-domain steganography over noisy channels using convolutional neural networks. Media Watermarking Secur Forensics 76\u20131:2020","journal-title":"Media Watermarking Secur Forensics"},{"key":"4559_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107143","author":"SA Roseline","year":"2021","unstructured":"Roseline SA, Geetha S (2021) A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks. J Comput Elect Eng. https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107143","journal-title":"J Comput Elect Eng"},{"key":"4559_CR23","doi-asserted-by":"publisher","first-page":"102228","DOI":"10.1016\/j.cose.2021.102228","volume":"105","author":"G Stergiopoulos","year":"2021","unstructured":"Stergiopoulos G, Gritzalis D, Vasilellis E, Anagnostopoulou A (2021) Dropping malware through sound injection: a comparative analysis on android operating systems. Comput Secur 105:102228. https:\/\/doi.org\/10.1016\/j.cose.2021.102228","journal-title":"Comput Secur"},{"key":"4559_CR24","doi-asserted-by":"publisher","first-page":"140957","DOI":"10.1109\/ACCESS.2019.2943504","volume":"7","author":"H Tian","year":"2019","unstructured":"Tian H, Liu J, Chang CC, Chen CC, Huang Y (2019) Steganalysis of AMR speech based on multiple classifiers combination. IEEE 7:140957\u2013140968. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943504","journal-title":"IEEE"},{"key":"4559_CR25","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.future.2021.01.004","volume":"118","author":"N Usman","year":"2021","unstructured":"Usman N, Usman S (2021) Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics. J Future Gener Comput Syst 118:124\u2013141. https:\/\/doi.org\/10.1016\/j.future.2021.01.004","journal-title":"J Future Gener Comput Syst"},{"key":"4559_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00779-5","author":"H Wang","year":"2021","unstructured":"Wang H, Pan X (2021) Steganalysis of convolutional neural network based on neural architecture search. J Multimed Syst. https:\/\/doi.org\/10.1007\/s00530-021-00779-5","journal-title":"J Multimed Syst"},{"key":"4559_CR27","first-page":"291","volume":"16","author":"HZ WeikeYou","year":"2020","unstructured":"WeikeYou HZ, Zhao X (2020) A Siamese CNN for image steganalysis. IEEE Transac Inform Forensics Secur 16:291\u2013306","journal-title":"IEEE Transac Inform Forensics Secur"},{"key":"4559_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114122","author":"D Zhao","year":"2021","unstructured":"Zhao D, Liu L, Yu F, Heidari AA, Wang M (2021) Ant colony optimization with horizontal and vertical crossover search: fundamental visions for multi-threshold image segmentation. J Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2020.114122","journal-title":"J Expert Syst Appl"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04559-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-023-04559-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04559-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,28]],"date-time":"2023-03-28T12:16:46Z","timestamp":1680005806000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-023-04559-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,24]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["4559"],"URL":"https:\/\/doi.org\/10.1007\/s12652-023-04559-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,24]]},"assertion":[{"value":"7 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}