{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:42:27Z","timestamp":1761896547475,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icpr.2016.7900302","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T17:12:47Z","timestamp":1493053967000},"page":"4256-4261","source":"Crossref","is-referenced-by-count":10,"title":["Selection of robust features for the Cover Source Mismatch problem in 3D steganalysis"],"prefix":"10.1109","author":[{"given":"Zhenyu","family":"Li","sequence":"first","affiliation":[]},{"given":"Adrian G.","family":"Bors","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025969"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2535555"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2041826"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_6"},{"key":"ref13","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"guyon","year":"2003","journal-title":"The Journal of Machine Learning Research"},{"journal-title":"Correlation-based feature selection for machine learning","year":"1999","author":"hall","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482965"},{"key":"ref16","first-page":"902801: 1","article-title":"A mishmash of methods for mitigating the modei mismatch mess","author":"ker","year":"2014","journal-title":"Proc of IS&T\/SPIE Electronic Imaging"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref18","first-page":"90280j:1","article-title":"Study of cover source mismatch in steganalysis and ways to mitigate its impact","author":"kodovsky","year":"2014","journal-title":"Proc of IS&T\/SPIE Electronic Imaging"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472056"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351050"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.94"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/142920.134010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"73:1","DOI":"10.1145\/1531326.1531379","article-title":"A benchmark for 3D mesh segmentation","volume":"28","author":"chen","year":"2009","journal-title":"ACM Transactions on Graphics"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2010.01767.x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2012.6467064"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2470220"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.882111"},{"key":"ref2","first-page":"27","article-title":"Conditional likelihood maximisation: a unifying framework for information theoretic feature selection","volume":"13","author":"brown","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref9","first-page":"1531","article-title":"Fast binary feature selection with conditional mutual information","volume":"5","author":"fleuret","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","article-title":"Break our steganographic system: The ins and outs of orgaizing BOSS","volume":"6958","author":"bas","year":"2011","journal-title":"Proc Information Hiding LNCS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482528"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11732242_9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361410"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref23","first-page":"2425","article-title":"Steganalysis with cover-source mismatch and a small learning database","author":"pasquet","year":"2014","journal-title":"Proc of the European Signal Processing Conference"},{"key":"ref26","first-page":"1","article-title":"AMR steganalysis based on the probability of same pulse position","author":"ren","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref25","first-page":"86650m: 1","article-title":"The challenges of rich features in universal ste-ganalysis","author":"pevny","year":"2013","journal-title":"Proc of IS&T\/SPIE Electronic Imaging"}],"event":{"name":"2016 23rd International Conference on Pattern Recognition (ICPR)","start":{"date-parts":[[2016,12,4]]},"location":"Cancun","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 23rd International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7893644\/7899596\/07900302.pdf?arnumber=7900302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T16:02:48Z","timestamp":1569081768000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7900302\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icpr.2016.7900302","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}