{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:21:39Z","timestamp":1775143299568,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T00:00:00Z","timestamp":1586131200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T00:00:00Z","timestamp":1586131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2016YFB0801303"],"award-info":[{"award-number":["2016YFB0801303"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2016QY01W0105"],"award-info":[{"award-number":["2016QY01W0105"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1636219"],"award-info":[{"award-number":["U1636219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1804263"],"award-info":[{"award-number":["U1804263"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1736214"],"award-info":[{"award-number":["U1736214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772549"],"award-info":[{"award-number":["61772549"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61602508"],"award-info":[{"award-number":["61602508"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Science and Technology Innovation Talent Project of Henan Province","award":["184200510018"],"award-info":[{"award-number":["184200510018"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Geolocation of covert communication entity is significantly important for the forensics of the crime but has significant challenges when the steganalyst locks the guilty actor IP and wants to know the physical location of the actor. This kind of post-steganalysis involves not only the stegos transmitted on the Internet but the IP package head and content. This paper presents a geolocation method for the location of the covert communication entity based on hop-hot path coding. The method estimates the location of the covert communication entity by combining the path and delay between probes and the covert communication entity IP, which improves the deficiency that similar delays do not necessarily mean close geographical locations of the IPs. Moreover, the similarity between the IPs\u2019 paths can be measured by coding the paths between IPs and probes. The results of a series of experiments show that the median error of the proposed method is within 6.16\u2009km using different thresholds.<\/jats:p>","DOI":"10.1186\/s13640-020-00504-8","type":"journal-article","created":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T18:04:27Z","timestamp":1586196267000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Geolocation of covert communication entity on the Internet for post-steganalysis"],"prefix":"10.1186","volume":"2020","author":[{"given":"Fan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,6]]},"reference":[{"issue":"8","key":"504_CR1","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TIFS.2019.2891237","volume":"14","author":"W Tang","year":"2019","unstructured":"W. Tang, B. Li, S. Tan, M. Barni, J. Huang, CNN-based adversarial embedding for image steganography. IEEE Trans. Inf. Forensic Secur. 14(8), 2074\u20132087 (2019)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"2","key":"504_CR2","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/TCSVT.2018.2799243","volume":"29","author":"Y Ma","year":"2019","unstructured":"Y. Ma, X. Luo, X. Li, Z. Bao, Y. Zhang, Selection of rich model steganalysis features based on decision rough set \u03b1-positive region reduction. IEEE Trans. Circuits Syst. Video Technol. 29(2), 336\u2013350 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"504_CR3","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"M. Boroumand, M. Chen, J. Fridrich, Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensic Secur. 14(5), 1181\u20131193 (2019)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"11","key":"504_CR4","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"J. Ye, J. Ni, Y. Yi, Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensic Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"504_CR5","doi-asserted-by":"publisher","unstructured":"R. Zhang, F. Zhu, J. Liu, G. Liu, Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans. Inf. Forensic Secur (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2936913","DOI":"10.1109\/TIFS.2019.2936913"},{"issue":"3","key":"504_CR6","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"J. Fridrich, J. Kodovsky, Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensic Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"5","key":"504_CR7","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1109\/TIFS.2017.2780805","volume":"13","author":"B Li","year":"2018","unstructured":"B. Li, Z. Li, S. Zhou, S. Tan, X. Zhang, New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator. IEEE Trans. Inf. Forensic Secur. 13(5), 1242\u20131257 (2018)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"504_CR8","doi-asserted-by":"publisher","unstructured":"P. Wang, F. Liu, C. Yang, Towards feature representation for steganalysis of spatial steganography. Signal Process. (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.107422","DOI":"10.1016\/j.sigpro.2019.107422"},{"key":"504_CR9","doi-asserted-by":"crossref","unstructured":"C Yang, Y Zhang, P Wang, X Luo, F Liu, J Lu, Steganalysis feature subspace selection based on fisher criterion. IEEE International Conference on Data Science and Advanced Analytics, Tokyo, Japan, 19-21 October 2017.","DOI":"10.1109\/DSAA.2017.53"},{"issue":"2","key":"504_CR10","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.3934\/mbe.2020055","volume":"17","author":"L Xiang","year":"2019","unstructured":"L. Xiang, G. Guo, J. Yu, V.S. Sheng, P. Yang, A convolutional neural network-based linguistic steganalysis for synonym substitution steganography. Math. Biosci. Eng. 17(2), 1041\u20131058 (2019)","journal-title":"Math. Biosci. Eng."},{"issue":"4","key":"504_CR11","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TIFS.2011.2160855","volume":"6","author":"TT Quach","year":"2011","unstructured":"T.T. Quach, Optimal cover estimation methods and steganographic payload location. IEEE Trans. Inf. Forensic Secur. 6(4), 1214\u20131222 (2011)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"504_CR12","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.dsp.2014.12.004","volume":"38","author":"J Liu","year":"2015","unstructured":"J. Liu, Y. Tian, T. Han, C.F. Yang, W.B. Liu, LSB steganographic payload location for JPEG-decompressed images. Digit. Signal Prog. 38, 66\u201376 (2015)","journal-title":"Digit. Signal Prog."},{"issue":"3","key":"504_CR13","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11554-019-00849-y","volume":"16","author":"Y Sun","year":"2019","unstructured":"Y. Sun, H. Zhang, T. Zhang, R. Wang, Deep neural networks for efficient steganographic payload location. J. Real-Time Image Process. 16(3), 635\u2013647 (2019)","journal-title":"J. Real-Time Image Process."},{"issue":"5","key":"504_CR14","doi-asserted-by":"publisher","first-page":"4908","DOI":"10.3934\/mbe.2019247","volume":"16","author":"C Yang","year":"2019","unstructured":"C. Yang, F. Liu, S. Ge, J. Lu, J. Huang, Locating secret messages based on quantitative steganalysis. Math. Biosci. Eng. 16(5), 4908\u20134922 (2019)","journal-title":"Math. Biosci. Eng."},{"issue":"2","key":"504_CR15","first-page":"633","volume":"60","author":"C Yang","year":"2019","unstructured":"C. Yang, J. Wang, C. Lin, H. Chen, W. Wang, Locating steganalysis of LSB matching based on spatial and wavelet filter fusion. CMC-Comput. Mat. Contin. 60(2), 633\u2013644 (2019)","journal-title":"CMC-Comput. Mat. Contin."},{"key":"504_CR16","doi-asserted-by":"crossref","unstructured":"J Liu, Y Tian, T Han, J Wang, X Luo, Stego key searching for LSB steganography on JPEG decompressed image. Sci. China-Inf. Sci. 59, 32105:1-32105:15 (2016)","DOI":"10.1007\/s11432-015-5367-x"},{"key":"504_CR17","doi-asserted-by":"crossref","unstructured":"C Yang, X Luo, J Lu, F Liu, Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci. China-Inf. Sci. 61(11), 119103:1-119103:3 (2018)","DOI":"10.1007\/s11432-017-9328-2"},{"key":"504_CR18","doi-asserted-by":"crossref","unstructured":"AD Ker, T Pevn\u00fd, Identifying a steganographer in realistic and heterogeneous data sets. Paper presented at Media Watermarking, Security, and Forensics, Burlingame, California, 13 February 2012.","DOI":"10.1117\/12.910565"},{"key":"504_CR19","doi-asserted-by":"crossref","unstructured":"M Zheng, S Zhong, S Wu, J Jiang, Steganographer detection via deep residual network. Paper presented at 2017 IEEE International Conference on Multimedia and Expo, ICME 2017, Hong Kong, China, 10-14 July 2017.","DOI":"10.1109\/ICME.2017.8019320"},{"issue":"9","key":"504_CR20","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/TIFS.2014.2336380","volume":"9","author":"AD Ker","year":"2014","unstructured":"A.D. Ker, T. Pevn\u00fd, The steganographer is the outlier: realistic large-scale steganalysis. IEEE Trans. Inf. Forensic Secur. 9(9), 1424\u20131435 (2014)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"504_CR21","unstructured":"Y Wang, D Burgener, M Flores, A Kuzmanovic, C Huang, Towards street-level client-independent IP geolocation. In Proceedings of the 8th USENIX conference on Networked systems design and implementation, Boston, MA, USA, 30 March 2011."},{"key":"504_CR22","doi-asserted-by":"publisher","unstructured":"F Zhao, X Luo, Y Gan, S Zu, Q Cheng, F Liu, IP Geolocation based on identification routers and local delay distribution similarity. Concurr. Comput.-Pract. Exp. (2018). doi: https:\/\/doi.org\/10.1002\/cpe.4722.","DOI":"10.1002\/cpe.4722"},{"key":"504_CR23","doi-asserted-by":"crossref","unstructured":"H Jiang, Y Liu, JN Matthews, IP geolocation estimation using neural networks with stable landmarks, In 2016 IEEE Conference on Computer Communications Workshops, San Francisco, CA, USA, 10-14 April 2016.","DOI":"10.1109\/INFCOMW.2016.7562066"},{"key":"504_CR24","doi-asserted-by":"crossref","unstructured":"B Augustin, X Cuvellier, B Orgogozo, F Viger, T Friedman, M Latapy, C Magnien, R Teixeira, Avoiding traceroute anomalies with Paris traceroute, In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, Rio de Janeriro, Brazil, 25\u201327 October 2006.","DOI":"10.1145\/1177080.1177100"},{"key":"504_CR25","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/964725.633039","volume":"32","author":"N Spring","year":"2002","unstructured":"N. Spring, R. Mahajan, D. Wetherall, Measuring ISP topologies with Rocketfuel. ACM SIGCOMM Comp. Commun. Rev. 32, 133\u2013145 (2002)","journal-title":"ACM SIGCOMM Comp. Commun. Rev."},{"key":"504_CR26","unstructured":"R Govindan, H Tangmunarunkit, Heuristics for Internet map discovery, In Proceedings IEEE INFOCOM 2000, Conference on Computer Communications, Tel Aviv, Israel, Israel, 26-30 March 2000."},{"key":"504_CR27","doi-asserted-by":"crossref","unstructured":"MH Gunes, K Sarac, Resolving anonymous routers in internet topology measurement studies, In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13-18 April 2008.","DOI":"10.1109\/INFOCOM.2008.162"},{"key":"504_CR28","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/35.41401","volume":"27","author":"RP Lippmann","year":"1989","unstructured":"R.P. Lippmann, Pattern classification using neural networks. IEEE Commun. Mag. 27, 47\u201350 (1989)","journal-title":"IEEE Commun. Mag."}],"updated-by":[{"DOI":"10.1186\/s13640-023-00602-3","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,3,13]],"date-time":"2023-03-13T00:00:00Z","timestamp":1678665600000}}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00504-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13640-020-00504-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00504-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,13]],"date-time":"2023-03-13T13:10:33Z","timestamp":1678713033000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-020-00504-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,6]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,12]]}},"alternative-id":["504"],"URL":"https:\/\/doi.org\/10.1186\/s13640-020-00504-8","relation":{"correction":[{"id-type":"doi","id":"10.1186\/s13640-023-00602-3","asserted-by":"object"}]},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,6]]},"assertion":[{"value":"11 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2023","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1186\/s13640-023-00602-3","URL":"https:\/\/doi.org\/10.1186\/s13640-023-00602-3","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"15"}}