{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T02:12:04Z","timestamp":1768097524575,"version":"3.49.0"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Science, Technology and Innovation Commission of Shenzhen Municipality","award":["JCYJ20180307151516166"],"award-info":[{"award-number":["JCYJ20180307151516166"]}]},{"name":"the Collaborative Innovation Center of Novel Software Technology and Industrialization"},{"name":"the Natural Science Foundation of Guangdong Province","award":["2016A030310053"],"award-info":[{"award-number":["2016A030310053"]}]},{"name":"the Shenzhen high-level overseas talents program"},{"name":"the National Science Foundation of China","award":["61202320"],"award-info":[{"award-number":["61202320"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2019,11,30]]},"abstract":"<jats:p>Steganographer detection aims to identify the guilty user who utilizes steganographic methods to hide secret information in the spread of multimedia data, especially image data, from a large amount of innocent users on social networks. A true embedding probability map illustrates the probability distribution of embedding secret information in the corresponding images by specific steganographic methods and settings, which has been successfully used as the guidance for content-adaptive steganographic and steganalytic methods. Unfortunately, in real-world situation, the detailed steganographic settings adopted by the guilty user cannot be known in advance. It thus becomes necessary to propose an automatic embedding probability estimation method. In this article, we propose a novel content-adaptive steganographer detection method via embedding probability estimation. The embedding probability estimation is first formulated as a learning-based saliency detection problem and the multi-scale estimated map is then integrated into the CNN to extract steganalytic features. Finally, the guilty user is detected via an efficient Gaussian vote method with the extracted steganalytic features. The experimental results prove that the proposed method is superior to the state-of-the-art methods in both spatial and frequency domains.<\/jats:p>","DOI":"10.1145\/3352691","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T13:12:30Z","timestamp":1576501950000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Steganographer Detection via Multi-Scale Embedding Probability Estimation"],"prefix":"10.1145","volume":"15","author":[{"given":"Sheng-Hua","family":"Zhong","sequence":"first","affiliation":[{"name":"Shenzhen University, Shenzhen, Guangdong, China"}]},{"given":"Yuantian","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Tongwei","family":"Ren","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Mingjie","family":"Zheng","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, Guangdong, China"}]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Kowloon, Hong Kong, China"}]},{"given":"Gangshan","family":"Wu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206596"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"e_1_2_2_3_1","first-page":"3118","article-title":"Salient object detection: A survey","volume":"16","author":"Borji Ali","year":"2014","unstructured":"Ali Borji , Ming-Ming Cheng , Qibin Hou , Huaizu Jiang , and Jia Li . 2014 . Salient object detection: A survey . Eprint Arxiv 16 , 7 (2014), 3118 . Ali Borji, Ming-Ming Cheng, Qibin Hou, Huaizu Jiang, and Jia Li. 2014. Salient object detection: A survey. Eprint Arxiv 16, 7 (2014), 3118.","journal-title":"Eprint Arxiv"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600942"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.01.014"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555281"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084302"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2174231"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077629"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.697471"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_16"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"e_1_2_2_16_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 733--740","author":"Hornung A.","unstructured":"A. Hornung , Y. Pritch , P. Krahenbuhl , and F. Perazzi . 2012. Saliency filters: Contrast based filtering for salient region detection . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 733--740 . A. Hornung, Y. Pritch, P. Krahenbuhl, and F. Perazzi. 2012. Saliency filters: Contrast based filtering for salient region detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 733--740."},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2815688"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3407642"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.65"},{"key":"e_1_2_2_20_1","volume-title":"Proceedings of the International Conference on Information Hiding. Springer, 265--281","author":"Ker Andrew D.","year":"2006","unstructured":"Andrew D. Ker . 2006 . Batch steganography and pooled steganalysis . In Proceedings of the International Conference on Information Hiding. Springer, 265--281 . Andrew D. Ker. 2006. Batch steganography and pooled steganalysis. In Proceedings of the International Conference on Information Hiding. Springer, 265--281."},{"key":"e_1_2_2_21_1","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents IX","author":"Ker Andrew D.","unstructured":"Andrew D. Ker . 2007. Batch steganography and the threshold game . In Security, Steganography, and Watermarking of Multimedia Contents IX . SPIE , 401--413. Andrew D. Ker. 2007. Batch steganography and the threshold game. In Security, Steganography, and Watermarking of Multimedia Contents IX. SPIE, 401--413."},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361409"},{"key":"e_1_2_2_23_1","volume-title":"Ker and Tom\u00e1\u0161 Pevn\u00fd","author":"Andrew","year":"2012","unstructured":"Andrew D. Ker and Tom\u00e1\u0161 Pevn\u00fd . 2012 . Identifying a steganographer in realistic and heterogeneous data sets. In Proceedings of the SPIE , Media Watermark., Security, Forensics XIV. 265--298. Andrew D. Ker and Tom\u00e1\u0161 Pevn\u00fd. 2012. Identifying a steganographer in realistic and heterogeneous data sets. In Proceedings of the SPIE, Media Watermark., Security, Forensics XIV. 265--298."},{"key":"e_1_2_2_24_1","volume-title":"Proc. SPIE 7880","author":"Andrew","year":"2012","unstructured":"Andrew D. Ker and Tom\u00e1\u0161 Pevn\u00fd. 2012. A new paradigm for steganalysis via clustering . Proc. SPIE 7880 , 2 ( 2012 ), 87--95. Andrew D. Ker and Tom\u00e1\u0161 Pevn\u00fd. 2012. A new paradigm for steganalysis via clustering. Proc. SPIE 7880, 2 (2012), 87--95."},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2336380"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451835"},{"key":"e_1_2_2_27_1","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems. 1097--1105","author":"Krizhevsky Alex","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E. Hinton . 2012. ImageNet classification with deep convolutional neural networks . In Proceedings of the International Conference on Neural Information Processing Systems. 1097--1105 . Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proceedings of the International Conference on Neural Information Processing Systems. 1097--1105."},{"key":"e_1_2_2_28_1","volume-title":"Proceedings of the IEEE International Conference on Image Processing. 4206--4210","author":"Li Bin","year":"2015","unstructured":"Bin Li , Ming Wang , Jiwu Huang , and Xiaolong Li . 2015 . A new cost function for spatial image steganography . In Proceedings of the IEEE International Conference on Image Processing. 4206--4210 . Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2015. A new cost function for spatial image steganography. In Proceedings of the IEEE International Conference on Image Processing. 4206--4210."},{"key":"e_1_2_2_29_1","first-page":"1","article-title":"Efficient steganographer detection over social networks with sampling reconstruction","volume":"7","author":"Li Fengyong","year":"2017","unstructured":"Fengyong Li , Mi Wen , Jingsheng Lei , and Yanli Ren . 2017 . Efficient steganographer detection over social networks with sampling reconstruction . Peer Peer Netw. Appl. 7 (2017), 1 -- 16 . Fengyong Li, Mi Wen, Jingsheng Lei, and Yanli Ren. 2017. Efficient steganographer detection over social networks with sampling reconstruction. Peer Peer Netw. Appl. 7 (2017), 1--16.","journal-title":"Peer Peer Netw. Appl."},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2496910"},{"key":"e_1_2_2_31_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 5455--5463","author":"Li Guanbin","year":"2015","unstructured":"Guanbin Li and Yizhou Yu . 2015 . Visual saliency based on multiscale deep features . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 5455--5463 . Guanbin Li and Yizhou Yu. 2015. Visual saliency based on multiscale deep features. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 5455--5463."},{"key":"e_1_2_2_32_1","volume-title":"Side channel steganalysis: When behavior is considered in steganographer detection. Multimedia Tools and Applications","author":"Li Li","year":"2018","unstructured":"Li Li , Weiming Zhang , Kejiang Chen , Hongyue Zha , and Nenghai Yu. 2018. Side channel steganalysis: When behavior is considered in steganographer detection. Multimedia Tools and Applications ( 2018 ), 1--15. Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha, and Nenghai Yu. 2018. Side channel steganalysis: When behavior is considered in steganographer detection. Multimedia Tools and Applications (2018), 1--15."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1734"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2051243"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.70"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190575"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.698"},{"key":"e_1_2_2_38_1","first-page":"11","volume-title":"IEEE Int. Conf. Comput. Vis. 2","author":"Martin David R.","year":"2001","unstructured":"David R. Martin , Charless Fowlkes , Doron Tal , and Jitendra Malik . 2001 . A database of human segmented natural images and its application to . IEEE Int. Conf. Comput. Vis. 2 , 11 (2001), 416--423. David R. Martin, Charless Fowlkes, Doron Tal, and Jitendra Malik. 2001. A database of human segmented natural images and its application to. IEEE Int. Conf. Comput. Vis. 2, 11 (2001), 416--423."},{"key":"e_1_2_2_39_1","first-page":"102","article-title":"Disclosure of organizational information on social media: Perspectives from security managers","volume":"4","author":"Molok N. N. A.","year":"2013","unstructured":"N. N. A. Molok , S. Chang , and A. Ahmad . 2013 . Disclosure of organizational information on social media: Perspectives from security managers . Nat. Protocols 4 , 1 (2013), 102 -- 106 . N. N. A. Molok, S. Chang, and A. Ahmad. 2013. Disclosure of organizational information on social media: Perspectives from security managers. Nat. Protocols 4, 1 (2013), 102--106.","journal-title":"Nat. Protocols"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2002936"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078"},{"key":"e_1_2_2_42_1","volume-title":"Media Watermarking, Security, and Forensics","author":"Qian Yinlong","year":"2015","unstructured":"Yinlong Qian , Jing Dong , Wei Wang , and Tieniu Tan . 2015. Deep learning for steganalysis via convolutional neural networks . In Media Watermarking, Security, and Forensics 2015 , Vol. 9409 . 94090J. Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Media Watermarking, Security, and Forensics 2015, Vol. 9409. 94090J."},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5326-1"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7503.003.0069"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077140"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600935"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2507159"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"#cr-split#-e_1_2_2_50_1.1","doi-asserted-by":"crossref","unstructured":"Songtao Wu Shenghua Zhong and Yan Liu. 2017. Deep residual learning for image steganalysis. Multimedia Tools Appl. (2017) 1--17. DOI:https:\/\/doi.org\/10.1007\/s11042-017-4440-4 10.1007\/s11042-017-4440-4","DOI":"10.1007\/s11042-017-4440-4"},{"key":"#cr-split#-e_1_2_2_50_1.2","doi-asserted-by":"crossref","unstructured":"Songtao Wu Shenghua Zhong and Yan Liu. 2017. Deep residual learning for image steganalysis. Multimedia Tools Appl. (2017) 1--17. DOI:https:\/\/doi.org\/10.1007\/s11042-017-4440-4","DOI":"10.1007\/s11042-017-4440-4"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4440-4"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2381-8"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_20"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2375793"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535555"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2170556"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.073"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2838334"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019320"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3206025.3206031"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2657886"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3352691","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3352691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:30Z","timestamp":1750206330000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3352691"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,30]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,11,30]]}},"alternative-id":["10.1145\/3352691"],"URL":"https:\/\/doi.org\/10.1145\/3352691","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,30]]},"assertion":[{"value":"2018-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}