{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:45:53Z","timestamp":1761597953815,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T00:00:00Z","timestamp":1528156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen high-level overseas talents program"},{"name":"Shenzhen Emerging Industries of the Strategic Basic Research Project","award":["JCYJ20160226191842793"],"award-info":[{"award-number":["JCYJ20160226191842793"]}]},{"name":"Natural Science Foundation of Guangdong Province","award":["2016A030310053, 2016A030310039, 2017A030310521"],"award-info":[{"award-number":["2016A030310053, 2016A030310039, 2017A030310521"]}]},{"name":"Tencent Rhinoceros Birds - Scientific Research Foundation for Young Teachers of Shenzhen University (2016)"},{"name":"Science and Technology Innovation Commission of Shenzhen","award":["JCYJ20160422151736824"],"award-info":[{"award-number":["JCYJ20160422151736824"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502311 and 61620106008"],"award-info":[{"award-number":["61502311 and 61620106008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,5]]},"DOI":"10.1145\/3206025.3206031","type":"proceedings-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T12:36:20Z","timestamp":1528720580000},"page":"300-308","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Steganographer Detection based on Multiclass Dilated Residual Networks"],"prefix":"10.1145","author":[{"given":"Mingjie","family":"Zheng","sequence":"first","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"given":"Sheng-hua","family":"Zhong","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"given":"Songtao","family":"Wu","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"given":"Jianmin","family":"Jiang","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2018,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2605499"},{"key":"e_1_3_2_1_3_1","first-page":"2","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"Li B.","year":"2011","unstructured":"B. Li , J. He , J. Huang , and Y. Q. Shi . 2011 . A survey on image steganography and steganalysis . Journal of Information Hiding and Multimedia Signal Processing. 2 , 2 (Apr. 2011), 142--172. B. Li, J. He, J. Huang, and Y. Q. Shi. 2011. A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing. 2, 2 (Apr. 2011), 142--172.","journal-title":"Journal of Information Hiding and Multimedia Signal Processing."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2496910"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"A. D. Ker and T. Pevn\u00fd. 2011. A new paradigm for steganalysis via clustering. In Proceeding of SPIE Media Watermarking. Security and Forensics III. San Francisco Airport California U.S. 78800U1-U13. A. D. Ker and T. Pevn\u00fd. 2011. A new paradigm for steganalysis via clustering. In Proceeding of SPIE Media Watermarking. Security and Forensics III. San Francisco Airport California U.S. 78800U1-U13.","DOI":"10.1117\/12.872888"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"T. Pevn\u00fd and J. Fridrich. 2007. Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceeding of SPIE Security Steganography and Watermarking of Multimedia Contents IX. San Jose CA U.S. 650503-14. T. Pevn\u00fd and J. Fridrich. 2007. Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceeding of SPIE Security Steganography and Watermarking of Multimedia Contents IX. San Jose CA U.S. 650503-14.","DOI":"10.1117\/12.696774"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"A. Gretton K. M. Borgwardt M. Rasch B. Sch\u00f6\u00f6lkopf and A. J. Smola. 2007. A kernel method for the two-sample-problem. In Proceeding of Advances in Neural Information Processing Systems (NIPS). Cambridge MA USA 513--520. A. Gretton K. M. Borgwardt M. Rasch B. Sch\u00f6\u00f6lkopf and A. J. Smola. 2007. A kernel method for the two-sample-problem. In Proceeding of Advances in Neural Information Processing Systems (NIPS). Cambridge MA USA 513--520.","DOI":"10.7551\/mitpress\/7503.003.0069"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"A. D. Ker and T. Pevn\u00fd. 2012. Identifying a steganographer in realistic and heterogeneous data sets. In Proceeding of SPIE Media Watermarking. Security and Forensics 2012. Burlingame California. U.S. 83030N1-N13. A. D. Ker and T. Pevn\u00fd. 2012. Identifying a steganographer in realistic and heterogeneous data sets. In Proceeding of SPIE Media Watermarking. Security and Forensics 2012. Burlingame California. U.S. 83030N1-N13.","DOI":"10.1117\/12.910565"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2336380"},{"key":"e_1_3_2_1_11_1","unstructured":"F. Li M. Wen J. Lei and Y. Ren. 2017. Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Networking and Applications. (Sep. 2017) 1--16. F. Li M. Wen J. Lei and Y. Ren. 2017. Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Networking and Applications. (Sep. 2017) 1--16."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078985"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078973"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3079030"},{"volume-title":"Proceeding of Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA). Siem Reap. 1--4.","author":"Tan S.","key":"e_1_3_2_1_15_1","unstructured":"S. Tan and B. Li . 2014. Stacked convolutional auto-encoders for steganalysis of digital images . In Proceeding of Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA). Siem Reap. 1--4. S. Tan and B. Li. 2014. Stacked convolutional auto-encoders for steganalysis of digital images. In Proceeding of Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA). Siem Reap. 1--4."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Y. Qian J. Dong W. Wang and T. Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Proceeding of SPIE Media Watermarking. Security and Forensics San Francisco California U.S. 9409J1-J10. Y. Qian J. Dong W. Wang and T. Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Proceeding of SPIE Media Watermarking. Security and Forensics San Francisco California U.S. 9409J1-J10.","DOI":"10.1117\/12.2083479"},{"volume-title":"Proceeding of IEEE International Conference on Image Processing (ICIP)","author":"Qian Y.","key":"e_1_3_2_1_17_1","unstructured":"Y. Qian , J. Dong , W. Wang , and T. Tan . 2016. Learning and transferring representations for image steganalysis using convolutional neural network . In Proceeding of IEEE International Conference on Image Processing (ICIP) , Phoenix, AZ. 2752--2756. Y. Qian, J. Dong, W. Wang, and T. Tan. 2016. Learning and transferring representations for image steganalysis using convolutional neural network. In Proceeding of IEEE International Conference on Image Processing (ICIP), Phoenix, AZ. 2752--2756."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930798"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4440-4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2779446"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083236"},{"key":"e_1_3_2_1_24_1","unstructured":"J. Yang Y. Shi E. K. Wong and X. Kang. 2017. JPEG steganalysis based on denseNet. arXiv: 1711.09335. Retrieved from https:\/\/arxiv.org\/abs\/1711.09335 J. Yang Y. Shi E. K. Wong and X. Kang. 2017. JPEG steganalysis based on denseNet. arXiv: 1711.09335. Retrieved from https:\/\/arxiv.org\/abs\/1711.09335"},{"volume-title":"Proceeding of IEEE International Conference on Multimedia and Expo (ICME'17)","author":"Zheng M.","key":"e_1_3_2_1_25_1","unstructured":"M. Zheng , S. Zhong , S. Wu , and J. Jiang . 2017. Steganographer detection via deep residual network . In Proceeding of IEEE International Conference on Multimedia and Expo (ICME'17) . Hong Kong, 235--240. M. Zheng, S. Zhong, S. Wu, and J. Jiang. 2017. Steganographer detection via deep residual network. In Proceeding of IEEE International Conference on Multimedia and Expo (ICME'17). Hong Kong, 235--240."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"J. Kodovsk\u00fd V. Sedighi and J. Fridrich. 2014. Study of cover source mismatch in steganalysis and ways to mitigate its impact. In Proceeding of SPIE Media Watermarking. Security and Forensics. San Francisco California U. S .90280J1-J12. J. Kodovsk\u00fd V. Sedighi and J. Fridrich. 2014. Study of cover source mismatch in steganalysis and ways to mitigate its impact. In Proceeding of SPIE Media Watermarking. Security and Forensics. San Francisco California U. S .90280J1-J12.","DOI":"10.1117\/12.2039693"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"volume-title":"Proceeding of the 13th International Workshop on Information Hiding (IH). Springer","author":"Bas P.","key":"e_1_3_2_1_28_1","unstructured":"P. Bas , T. Filler , and T. Pevn\u00fd . 2011. \"Break our steganographic system\": The ins and outs of organizing BOSS . In Proceeding of the 13th International Workshop on Information Hiding (IH). Springer , Berlin, Heidelberg, 59--70. P. Bas, T. Filler, and T. Pevn\u00fd. 2011. \"Break our steganographic system\": The ins and outs of organizing BOSS. In Proceeding of the 13th International Workshop on Information Hiding (IH). Springer, Berlin, Heidelberg, 59--70."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"volume-title":"Proceeding of IEEE International Conference on Image Processing (ICIP)","author":"Li B.","key":"e_1_3_2_1_31_1","unstructured":"B. Li , M. Wang , J. Huang , and X. Li . 2014. A new cost function for spatial image steganography . In Proceeding of IEEE International Conference on Image Processing (ICIP) . Paris, France, 4206--4210. B. Li, M. Wang, J. Huang, and X. Li. 2014. A new cost function for spatial image steganography. In Proceeding of IEEE International Conference on Image Processing (ICIP). Paris, France, 4206--4210."},{"volume-title":"Proceeding of IEEE International Workshop on Information Forensics and Security (WIFS). Tenerife, 234--239","author":"Holub V.","key":"e_1_3_2_1_32_1","unstructured":"V. Holub and J. Fridrich . 2012. Designing steganographic distortion using directional filters . In Proceeding of IEEE International Workshop on Information Forensics and Security (WIFS). Tenerife, 234--239 . V. Holub and J. Fridrich. 2012. Designing steganographic distortion using directional filters. In Proceeding of IEEE International Workshop on Information Forensics and Security (WIFS). Tenerife, 234--239."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077629"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_1_36_1","unstructured":"A. Krizhevsky I. Sutskever and G. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proceeding of Advances in Neural Information Processing Systems (NIPS). 1097--1105. A. Krizhevsky I. Sutskever and G. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proceeding of Advances in Neural Information Processing Systems (NIPS). 1097--1105."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288872"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2364918"}],"event":{"name":"ICMR '18: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Yokohama Japan","acronym":"ICMR '18"},"container-title":["Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206025.3206031","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3206025.3206031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:15Z","timestamp":1750208895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206025.3206031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,5]]},"references-count":38,"alternative-id":["10.1145\/3206025.3206031","10.1145\/3206025"],"URL":"https:\/\/doi.org\/10.1145\/3206025.3206031","relation":{},"subject":[],"published":{"date-parts":[[2018,6,5]]},"assertion":[{"value":"2018-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}