{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:39:05Z","timestamp":1761896345463,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,20]],"date-time":"2016-06-20T00:00:00Z","timestamp":1466380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,20]]},"DOI":"10.1145\/2909827.2930799","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T13:57:38Z","timestamp":1465567058000},"page":"109-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Color Image Steganalysis Based On Steerable Gaussian Filters Bank"],"prefix":"10.1145","author":[{"given":"Hasan","family":"Abdulrahman","sequence":"first","affiliation":[{"name":"Montpellier University \/ Ecole des Mines d'Al\u00e8s, LGI2P., Montpellier, France"}]},{"given":"Marc","family":"Chaumont","sequence":"additional","affiliation":[{"name":"N\u00eemes University, Montpellier University \/ UMR5506-LIRMM., Montpellier, France"}]},{"given":"Philippe","family":"Montesinos","sequence":"additional","affiliation":[{"name":"Ecole des Mines d'Al\u00e8s, LGI2P., N\u00eemes, France"}]},{"given":"Baptiste","family":"Magnier","sequence":"additional","affiliation":[{"name":"Ecole des Mines d'Al\u00e8s, LGI2P., N\u00eemes, France"}]}],"member":"320","published-online":{"date-parts":[[2016,6,20]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/ARES.2015.44"},{"key":"e_1_3_2_1_2_1","volume-title":"Color images steganalysis using rgb channelgeometric transformation measures","author":"Abdulrahman H.","year":"2016","unstructured":"H. Abdulrahman , M. Chaumont , P. Montesinos , and B. Magnier . Color images steganalysis using rgb channelgeometric transformation measures . Wiley J. on Security and Communication Networks, (DOI: 10.1002\/sec.1427):12 pages, Feb. 2016 . 10.1002\/sec.1427):12 H. Abdulrahman, M. Chaumont, P. Montesinos, and B. Magnier. Color images steganalysis using rgb channelgeometric transformation measures.Wiley J. on Security and Communication Networks, (DOI: 10.1002\/sec.1427):12 pages, Feb. 2016."},{"key":"e_1_3_2_1_3_1","first-page":"59","volume-title":"13th Int. Workshop, Lecture Notes in Computer Science","author":"Bas P.","year":"2011","unstructured":"P. Bas , T. Filler , and T. Pevny . \" Break our steganographic system\": The ins and outs of organizing boss. Inf. Hiding , 13th Int. Workshop, Lecture Notes in Computer Science , Prague, Czech , pages 59 -- 70 , May 2011 . P. Bas, T. Filler, and T. Pevny. \"Break our steganographic system\": The ins and outs of organizing boss. Inf. Hiding, 13th Int. Workshop, Lecture Notes in Computer Science, Prague, Czech, pages 59--70, May 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2756601.2756620"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/34.93808"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/TIFS.2012.2190402"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/ICME.2000.871000"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1774088.1774427"},{"volume-title":"Proc. IS&T\/SPIE Electronic Imaging, Int","author":"Goljan M.","unstructured":"M. Goljan and J. Fridrich . CFA-aware features for steganalysis of color images . In Proc. IS&T\/SPIE Electronic Imaging, Int . Society for Optics and Photonics (SPIE) , San Francisco, CA, USA , volume 94090V, page (13), Feb. 2015 . M. Goljan and J. Fridrich. CFA-aware features for steganalysis of color images. In Proc. IS&T\/SPIE Electronic Imaging, Int. Society for Optics and Photonics (SPIE), San Francisco, CA, USA, volume 94090V, page (13), Feb. 2015.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/WIFS.2014.7084325"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1117\/12.476813"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/WIFS.2012.6412655"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1186\/1687-417X-2014-1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2482513.2482965"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICASSP.2014.6854349"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"e_1_3_2_1_17_1","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"Li B.","year":"2011","unstructured":"B. Li , J. He , J. Huang , and Y. Q. Shi . A survey on image steganography and steganalysis . J. of Inf. Hiding and Multimedia Signal Process. , Vol. 2 :pp. 142 -- 172 , Apr. 2011 . B. Li, J. He, J. Huang, and Y. Q. Shi. A survey on image steganography and steganalysis. J. of Inf. Hiding and Multimedia Signal Process., Vol.2:pp.142--172, Apr. 2011.","journal-title":"J. of Inf. Hiding and Multimedia Signal Process."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/ICIP.2014.7025854"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1016\/j.ins.2007.08.007"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1155\/2009\/901381"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/TIFS.2010.2045842"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/1929304.1929317"},{"key":"e_1_3_2_1_23_1","first-page":"197","article-title":"Clustering steganographic modification directions for color components. Signal Processing Letters","volume":"23","author":"Tang W.","year":"2016","unstructured":"W. Tang , B. Li , W. Luo , and J. Huang . Clustering steganographic modification directions for color components. Signal Processing Letters , IEEE , Vol. 23 (No.2): 197 -- 201 , Feb. 2016 . W. Tang, B. Li, W. Luo, and J. Huang. Clustering steganographic modification directions for color components. Signal Processing Letters,IEEE, Vol.23(No.2):197--201, Feb. 2016.","journal-title":"IEEE"},{"key":"e_1_3_2_1_24_1","volume-title":"Int. J. of Signal and Image Processing (SIPIJ)","volume":"2011","author":"Thiyagarajan P.","unstructured":"P. Thiyagarajan , G. Aghila , and V. P. Venkatesan . Steganalysis using color model conversion . Int. J. of Signal and Image Processing (SIPIJ) , Vol.2(No.4), Dec. 2011 . P. Thiyagarajan, G. Aghila, and V. P. Venkatesan. Steganalysis using color model conversion. Int. J. of Signal and Image Processing (SIPIJ), Vol.2(No.4), Dec. 2011."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/10719724_5","volume-title":"Proc. on Information Hiding","author":"Westfeld A.","year":"2000","unstructured":"A. Westfeld and A. Pfitzmann . Attacks on steganographic systems . In Proc. on Information Hiding , In : Pfitzmann A. (eds.): 3rd Int. Workshop Lecture Notes in Computer Science, Springer-Verlag , Berlin Heidelberg, volume 1768 , pages 61 -- 76 , 2000 . A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In Proc. on Information Hiding, In: Pfitzmann A. (eds.): 3rd Int. Workshop Lecture Notes in Computer Science, Springer-Verlag, Berlin Heidelberg, volume 1768, pages 61--76, 2000."}],"event":{"sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"acronym":"IH&MMSec '16","name":"IH&MMSec '16: ACM Information Hiding and Multimedia Security Workshop","location":"Vigo Galicia Spain"},"container-title":["Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2909827.2930799","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2909827.2930799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:23Z","timestamp":1750220603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2909827.2930799"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,20]]},"references-count":25,"alternative-id":["10.1145\/2909827.2930799","10.1145\/2909827"],"URL":"https:\/\/doi.org\/10.1145\/2909827.2930799","relation":{},"subject":[],"published":{"date-parts":[[2016,6,20]]},"assertion":[{"value":"2016-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}