{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:58:28Z","timestamp":1729670308175,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/icip.2014.7025853","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T12:41:49Z","timestamp":1423140109000},"page":"4201-4205","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid weighted-stego detection using machine learning"],"prefix":"10.1109","author":[{"given":"Lionel","family":"Fillatre","sequence":"first","affiliation":[]},{"given":"Muriel","family":"Dumontet","sequence":"additional","affiliation":[]},{"given":"Wafa Bel Haj","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Antonini","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Barlaud","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"501","article-title":"Revisiting weighted stego-image steganalysis","author":"ker","year":"2008","journal-title":"Proc SPIE 6819 Secur Forens Steganogr Watermarking of Multimed Contents X"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-540-88961-8_13","article-title":"Weighted stego-image steganalysis for JPEG covers","author":"b\u00f6hme","year":"2008","journal-title":"Information Hiding LNCS 5284"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1198\/016214505000000907"},{"key":"ref13","first-page":"1201","article-title":"On the efficient minimization of classification-calibrated surrogates","author":"nock","year":"2008","journal-title":"NIPS08"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33460-3_26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273598"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/978-3-642-35289-8_25","article-title":"Stochastic gradient descent tricks","author":"bottou","year":"2012","journal-title":"Neural Networks Tricks of the Trade Ser Lecture Notes in Computer Science"},{"key":"ref18","article-title":"Minimizing Calibrated Loss using Stochastic Low-Rank Newton Descent for large scale image classification","author":"bel","year":"2013","journal-title":"INRIA Tech Rep ISRN I3S\/RT-2013-03-FR"},{"key":"ref19","article-title":"Probabilistic outputs for support vector machines and comparison to regularized likelihood methods","author":"platt","year":"2000","journal-title":"Advances in Large Margin Classifiers"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14313-7","author":"bohme","year":"2010","journal-title":"Advanced Statistical Steganalysis ser Information Security and Cryptography"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412648"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1117\/12.521350","article-title":"On estimation of secret message length in LSB steganography in spatial domain","volume":"5306","author":"fridrich","year":"2004","journal-title":"Proc SPIE Security Steganography Watermarking Multimedia Contents"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2235832"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2174231"},{"journal-title":"Digital Watermarking and Steganography","year":"2007","author":"cox","key":"ref2"},{"journal-title":"Data Hiding Fundamentals and Applications Content Security in Digital Multimedia","year":"2004","author":"sencar","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2007.4299815"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"year":"2010","key":"ref22","article-title":"Break Our Steganography System"},{"article-title":"Boosting stochastic newton with entropy constraint for large-scale image classification","year":"0","author":"bel","key":"ref21"}],"event":{"name":"2014 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2014,10,27]]},"location":"Paris, France","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6992914\/7024995\/07025853.pdf?arnumber=7025853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:01:45Z","timestamp":1498179705000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7025853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icip.2014.7025853","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}