{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:28:31Z","timestamp":1761895711115,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,17]],"date-time":"2013-06-17T00:00:00Z","timestamp":1371427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,17]]},"DOI":"10.1145\/2482513.2482528","type":"proceedings-article","created":{"date-parts":[[2013,6,18]],"date-time":"2013-06-18T12:36:08Z","timestamp":1371558968000},"page":"77-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Embedding change rate estimation based on ensemble learning"],"prefix":"10.1145","author":[{"given":"Zhenyu","family":"Li","sequence":"first","affiliation":[{"name":"Zhengzhou Institute of Information Science and Technology, Zhengzhou, China"}]},{"given":"Zongyun","family":"Hu","sequence":"additional","affiliation":[{"name":"Zhengzhou Institute of Information Science and Technology, Zhengzhou, China"}]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[{"name":"Zhengzhou Institute of Information Science and Technology, Zhengzhou, China"}]},{"given":"Bin","family":"Lu","sequence":"additional","affiliation":[{"name":"Zhengzhou Institute of Information Science and Technology, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2013,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2004.04.005"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding, 13th International Workshop","author":"Bas P.","year":"2011","unstructured":"P. Bas , T. Filler , and T. Pevn\u00fd . Break our steganographic system -- the ins and outs of organizing boss . In T. Filler, T. Pevn\u00fd, S. Craver, and A. Ker, editors, Information Hiding, 13th International Workshop , volume 6958 of Lecture Notes in Computer Science , pages 59 -- 70 , Prague, Czech Republic , May 18--20, 2011 . Springer . P. Bas, T. Filler, and T. Pevn\u00fd. Break our steganographic system -- the ins and outs of organizing boss. In T. Filler, T. Pevn\u00fd, S. Craver, and A. Ker, editors, Information Hiding, 13th International Workshop, volume 6958 of Lecture Notes in Computer Science, pages 59--70, Prague, Czech Republic, May 18--20, 2011. Springer."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015432"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007607513941"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/3-540-36415-3_23","volume-title":"Information Hiding, 5th International Workshop","author":"Dumitrescu S.","year":"2003","unstructured":"S. Dumitrescu , X. Wu , and Z. Wang . Detection of lsb steganography via sample pair analysis . In F. Petitcolas, editor, Information Hiding, 5th International Workshop , volume 2578 of Lecture Notes in Computer Science , pages 355 -- 372 , Noordwijkerhout, The Netherlands , October 7--9, 2003 . Springer . S. Dumitrescu, X. Wu, and Z. Wang. Detection of lsb steganography via sample pair analysis. In F. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 355--372, Noordwijkerhout, The Netherlands, October 7--9, 2003. Springer."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.1201\/9780429246593","volume-title":"An introduction to the bootstrap","author":"Efron B.","year":"1994","unstructured":"B. Efron and R. Tibshirani . An introduction to the bootstrap , volume 57 . Chapman & Hall\/CRC , 1994 . B. Efron and R. Tibshirani. An introduction to the bootstrap, volume 57. Chapman & Hall\/CRC, 1994."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of Media Watermarking, Security and Forensics III, SPIE, 7880: 78800F--1","author":"Filler T.","year":"2011","unstructured":"T. Filler and J. Fridrich . Design of adaptive steganographic schemes for digital images . Proceedings of Media Watermarking, Security and Forensics III, SPIE, 7880: 78800F--1 , 2011 . T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. Proceedings of Media Watermarking, Security and Forensics III, SPIE, 7880:78800F--1, 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-005-0194-3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288872"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.109"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.709601"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597830"},{"key":"e_1_3_2_1_15_1","first-page":"83030A","volume-title":"IS&T\/SPIE Electronic Imaging","author":"Kodovsk\u00fd J.","year":"2012","unstructured":"J. Kodovsk\u00fd and J. Fridrich . Steganalysis of jpeg images using rich models . In IS&T\/SPIE Electronic Imaging , pages 83030A -- 83030A . International Society for Optics and Photonics , 2012 . J. Kodovsk\u00fd and J. Fridrich. Steganalysis of jpeg images using rich models. In IS&T\/SPIE Electronic Imaging, pages 83030A--83030A. International Society for Optics and Photonics, 2012."},{"issue":"2","key":"e_1_3_2_1_16_1","first-page":"432","article-title":"Ensemble classifiers for steganalysis of digital media. Information Forensics and Security","volume":"7","author":"Kodovsk\u00fd J.","year":"2012","unstructured":"J. Kodovsk\u00fd , J. Fridrich , and V. Holub . Ensemble classifiers for steganalysis of digital media. Information Forensics and Security , IEEE Transactions on , 7 ( 2 ): 432 -- 444 , 2012 . J. Kodovsk\u00fd, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. Information Forensics and Security, IEEE Transactions on, 7(2):432--444, 2012.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-002-0173-7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3119933.3119967"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2041812"},{"key":"e_1_3_2_1_20_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Information Hiding, 12th International Conference","author":"Pevn\u00fd T.","year":"2010","unstructured":"T. Pevn\u00fd , T. Filler , and P. Bas . Using high-dimensional image models to perform highly undetectable steganography . In R. B\u00f6hme, P. W. Fong, and R. Safavi-Naini, editors, Information Hiding, 12th International Conference , volume 6387 of Lecture Notes in Computer Science , pages 161 -- 177 , Calgary, AB , Canada, June 28--30, 2010 . Springer . T. Pevn\u00fd, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. B\u00f6hme, P. W. Fong, and R. Safavi-Naini, editors, Information Hiding, 12th International Conference, volume 6387 of Lecture Notes in Computer Science, pages 161--177, Calgary, AB, Canada, June 28--30, 2010. Springer."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.696774"},{"issue":"2","key":"e_1_3_2_1_22_1","first-page":"445","article-title":"From blind to quantitative steganalysis. Information Forensics and Security","volume":"7","author":"Pevn\u00fd T.","year":"2012","unstructured":"T. Pevn\u00fd , J. Fridrich , and A. Ker . From blind to quantitative steganalysis. Information Forensics and Security , IEEE Transactions on , 7 ( 2 ): 445 -- 454 , 2012 . T. Pevn\u00fd, J. Fridrich, and A. Ker. From blind to quantitative steganalysis. Information Forensics and Security, IEEE Transactions on, 7(2):445--454, 2012.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:STCO.0000035301.49549.88"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_12"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","DOI":"10.1201\/b12207","volume-title":"Ensemble Methods: Foundations and Algorithms","author":"Zhou Z.","year":"2012","unstructured":"Z. Zhou . Ensemble Methods: Foundations and Algorithms . Chapman & Hall , 2012 . Z. Zhou. Ensemble Methods: Foundations and Algorithms. Chapman & Hall, 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(02)00190-X"}],"event":{"name":"IH&MMSec '13: ACM Information Hiding and Multimedia Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Montpellier France","acronym":"IH&MMSec '13"},"container-title":["Proceedings of the first ACM workshop on Information hiding and multimedia security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2482513.2482528","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2482513.2482528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:10Z","timestamp":1750235950000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2482513.2482528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,17]]},"references-count":26,"alternative-id":["10.1145\/2482513.2482528","10.1145\/2482513"],"URL":"https:\/\/doi.org\/10.1145\/2482513.2482528","relation":{},"subject":[],"published":{"date-parts":[[2013,6,17]]},"assertion":[{"value":"2013-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}