{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T12:06:14Z","timestamp":1648555574296},"reference-count":10,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1587\/transinf.2021edl8058","type":"journal-article","created":{"date-parts":[[2021,12,31]],"date-time":"2021-12-31T22:24:00Z","timestamp":1640989440000},"page":"180-183","source":"Crossref","is-referenced-by-count":0,"title":["JPEG Image Steganalysis Using Weight Allocation from Block Evaluation"],"prefix":"10.1587","volume":"E105.D","author":[{"given":"Weiwei","family":"LUO","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou Jiaotong University"}]},{"given":"Wenpeng","family":"ZHOU","sequence":"additional","affiliation":[{"name":"Zhejiang Police Vocational Academy"}]},{"given":"Jinglong","family":"FANG","sequence":"additional","affiliation":[{"name":"School of Computer Science, Hangzhou Dianzi University"}]},{"given":"Lingyan","family":"FAN","sequence":"additional","affiliation":[{"name":"Micro-Electronics Research Institute, Hangzhou Dianzi University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] J. Kodovsk\u00fd, J. Fridrich, and V. Holub, \u201cEnsemble classifiers for steganalysis of digital media,\u201d IEEE Transactions on Information Forensics and Security, vol.7, no.2, pp.432-444, 2012. 10.1109\/tifs.2011.2175919","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] J. Kodovsk\u00fd and J. Fridrich, \u201cSteganalysis of JPEG images using rich models,\u201d Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, San Francisco, CA, vol.8303, p.83030A, Jan. 23-25, 2012. 10.1117\/12.907495","DOI":"10.1117\/12.907495"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] V. Holub and J. Fridrich, \u201cLow complexity features for JPEG steganalysis using undecimated DCT,\u201d IEEE Transactions on Information Forensics and Security, vol.10, no.2, pp.219-228, 2015. 10.1109\/tifs.2014.2364918","DOI":"10.1109\/TIFS.2014.2364918"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang, \u201cSteganalysis of adaptive JPEG steganography using 2D Gabor filters,\u201d Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp.15-23, 2015. 10.1145\/2756601.2756608","DOI":"10.1145\/2756601.2756608"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] T. Denemark, M. Boroumand, and J. Fridrich, \u201cSteganalysis features for content-adaptive JPEG steganography,\u201d IEEE Transactions on Information Forensics and Security, vol.11, no.8, pp.1736-1746, 2016. 10.1109\/tifs.2016.2555281","DOI":"10.1109\/TIFS.2016.2555281"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] G. Feng, X. Zhang, Y. Ren, Z. Qian, and S. Li, \u201cDiversity-based cascade filters for JPEG steganalysis,\u201d IEEE Transactions on Circuits and Systems for Video Technology, vol.30, no.2, pp.376-386, 2020. 10.1109\/tcsvt.2019.2891778","DOI":"10.1109\/TCSVT.2019.2891778"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] Z. Jin, G. Feng, Y. Ren, and X. Zhang, \u201cFeature extraction optimization of JPEG steganalysis based on residual images,\u201d Signal Processing, vol.170, no.5, p.107455, 2020. 10.1016\/j.sigpro.2020.107455","DOI":"10.1016\/j.sigpro.2020.107455"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] L. Guo, J. Ni, W. Su, C. Tang, and Y.-Q. Shi, \u201cUsing statistical image model for JPEG steganography: uniform embedding revisited,\u201d IEEE Transactions on Information Forensics and Security, vol.10, no.12, pp.2669-2680, 2015. 10.1109\/tifs.2015.2473815","DOI":"10.1109\/TIFS.2015.2473815"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] T. Filler, J. Judas, and J. Fridrich, \u201cMinimizing additive distortion in steganography using syndrome-trellis codes,\u201d IEEE Transactions on Information Forensics and Security, vol.6, no.3, pp.920-935, 2011. 10.1109\/tifs.2011.2134094","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] V. Holub, J. Fridrich, and T. Denemark, \u201cUniversal distortion function for steganography in an arbitrary domain,\u201d EURASIP Journal on Information Security, vol.2014, no.1, pp.1-13, 2014. 10.1186\/1687-417x-2014-1","DOI":"10.1186\/1687-417X-2014-1"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/1\/E105.D_2021EDL8058\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T04:03:18Z","timestamp":1641009798000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/1\/E105.D_2021EDL8058\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021edl8058","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]},"article-number":"2021EDL8058"}}