{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:03:58Z","timestamp":1771373038685,"version":"3.50.1"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572329"],"award-info":[{"award-number":["61572329"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772349"],"award-info":[{"award-number":["61772349"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636202"],"award-info":[{"award-number":["U1636202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen R&amp;D Program","award":["JCYJ20160328144421330"],"award-info":[{"award-number":["JCYJ20160328144421330"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/lsp.2018.2816569","type":"journal-article","created":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T18:04:54Z","timestamp":1521741894000},"page":"650-654","source":"Crossref","is-referenced-by-count":103,"title":["ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2613-5451","authenticated-orcid":false,"given":"Bin","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1738-2984","authenticated-orcid":false,"given":"Weihang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Anselmo","family":"Ferreira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7457-3691","authenticated-orcid":false,"given":"Shunquan","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2286682"},{"key":"ref13","first-page":"63","article-title":"Textural features for steganalysis","author":"shi","year":"2012","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2780805"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref16","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref18","first-page":"770","article-title":"Deep residual learning for image recognition","author":"he","year":"2015","journal-title":"Proc Int Conf Comput Vis Pattern Recognit"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756608"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"ref27","first-page":"1","article-title":"Network in network","author":"lin","year":"2014","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1109\/TIFS.2015.2434600","article-title":"A strategy of clustering modification directions in spatial image steganography","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref8","article-title":"Why are jihadis so obsessed with porn?","author":"chesler","year":"2015","journal-title":"The Middle East Quarterly"},{"key":"ref7","article-title":"Japanese cartoon icon hello kitty's hello to big money","author":"baker","year":"2008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref9","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"li","year":"2011","journal-title":"J Inf Hiding Multimedia Signal Process"},{"key":"ref1","author":"cox","year":"2008","journal-title":"Digital Watermarking and Steganography"},{"key":"ref20","first-page":"94\ufffd090j?1","article-title":"Deep learning for steganalysis via convolutional neural networks","author":"qian","year":"2015","journal-title":"Proc IS&T\/SPIE Electron Imaging (Media Watermarking Secur Forensics)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930798"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-325"},{"key":"ref26","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume":"37","author":"ioffe","year":"2015","journal-title":"Proceedings of the 32nd Intl Conf on Machine Learning"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/97\/8328943\/08322175.pdf?arnumber=8322175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:12:22Z","timestamp":1642003942000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8322175\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":29,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/lsp.2018.2816569","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"value":"1070-9908","type":"print"},{"value":"1558-2361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}