{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T13:36:25Z","timestamp":1779024985199,"version":"3.51.4"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972390"],"award-info":[{"award-number":["61972390"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802393"],"award-info":[{"award-number":["61802393"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736214"],"award-info":[{"award-number":["U1736214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2019QY0701"],"award-info":[{"award-number":["2019QY0701"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Climbing Program of the Institute of Information Engineering of the Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tifs.2020.3013204","type":"journal-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T21:01:10Z","timestamp":1596142870000},"page":"291-306","source":"Crossref","is-referenced-by-count":249,"title":["A Siamese CNN for Image Steganalysis"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2642-6005","authenticated-orcid":false,"given":"Weike","family":"You","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3480-0244","authenticated-orcid":false,"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5617-8399","authenticated-orcid":false,"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852771"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1994.413536"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2940904"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335727"},{"key":"ref37","first-page":"534","article-title":"SSGAN: Secure steganography based on generative adversarial networks","author":"shi","year":"2017","journal-title":"Proc Pacific-rim Conf Multimedia (PCM)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_13"},{"key":"ref35","author":"cogranne","year":"2019","journal-title":"Documentation of Alaskav2 Dataset Scripts A Hint Moving Towards Steganography and Steganalysis into the Wild"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335726"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2018.00091"},{"key":"ref62","article-title":"The square root law of steganographic capacity for Markov covers","author":"filler","year":"2009","journal-title":"Proceedings of Media Forensics and Security"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.2001399"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8804415"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"ref27","first-page":"2092","article-title":"Yedroudj-net: An efficient CNN for spatial steganalysis","author":"yedroudj","year":"2018","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process (ICASSP)"},{"key":"ref29","first-page":"1","article-title":"Steganalyzing images of arbitrary size with CNNs","volume":"2018","author":"tsang","year":"2018","journal-title":"Electron Imag"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482514"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref20","article-title":"Deep learning for steganalysis via convolutional neural networks","author":"qian","year":"2015","journal-title":"Proc of the SPIE Media Watermarking Security and Forensics"},{"key":"ref22","first-page":"1","article-title":"Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch","author":"pibre","year":"2016","journal-title":"Proc Media Watermarking Secur Forensics (MWSF)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532860"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930798"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2816569"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_20"},{"key":"ref50","first-page":"1988","article-title":"Deep learning face representation by joint identification-verification","author":"sun","year":"2014","journal-title":"Proc 28th Annu Conf Adv Neural Inf Process Syst"},{"key":"ref51","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref59","author":"whitehead","year":"2011","journal-title":"Precision & Performance Floating Point and IEEE 754 Compliance for NVIDIA GPUs"},{"key":"ref58","author":"nvidia","year":"2017","journal-title":"Nvidia tesla v100 gpu architecture"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411349"},{"key":"ref56","year":"2019","journal-title":"Version 4 53&#x2014;64 Bit"},{"key":"ref55","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"Proc Int Conf Learn Represent (ICLR)ICLR"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref53","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc Int Conf Learn Represent (ICLR)ICLR"},{"key":"ref52","article-title":"Highway networks","author":"srivastava","year":"2015","journal-title":"arXiv 1505 00387"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922229"},{"key":"ref11","first-page":"19","article-title":"A novel mapping scheme for steganalysis","author":"chen","year":"2012","journal-title":"Proc 11th Int Workshop Digit Forensics Watermaking (IWDW)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084302"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600935"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368597"},{"key":"ref15","article-title":"Towards dependable steganalysis","author":"pevn\u00fd","year":"2015","journal-title":"Proc of the SPIE Media Watermarking Security and Forensics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"ref18","first-page":"1","article-title":"Deep learning in steganography and steganalysis from 2015 to 2018","author":"chaumont","year":"2020","journal-title":"Digital Media Steganography Principles Algorithms Advances"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.807363"},{"key":"ref7","first-page":"340","article-title":"Detecting hidden messages using higher-order statistics and support vector machines","author":"lyu","year":"2002","journal-title":"Proc 5th Int Workshop Inform Hiding"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1039053"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.100"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001493000339"},{"key":"ref47","first-page":"3279","article-title":"MatchNet: Unifying feature and metric learning for patch-based matching","author":"han","year":"2015","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335737"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"ref43","first-page":"1954","article-title":"Generating steganographic images via adversarial training","author":"hayes","year":"2017","journal-title":"Proc Annu Conf Neural Inf Process Syst (NIPS)"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9151439\/09153041.pdf?arnumber=9153041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:43Z","timestamp":1652194363000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9153041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/tifs.2020.3013204","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}