{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:27:20Z","timestamp":1741325240476,"version":"3.38.0"},"reference-count":98,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055735","type":"journal-article","created":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T07:13:21Z","timestamp":1728976401000},"page":"105-131","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Digital Image Steganographer Identification: A Comprehensive Survey"],"prefix":"10.32604","volume":"81","author":[{"given":"Qianqian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yanmei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"5026","DOI":"10.1109\/TIFS.2023.3303715","article-title":"Quaternary quantized gaussian modulation with optimal polarity map selection for JPEG steganography","volume":"18","author":"Li","year":"Apr. 2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2282","DOI":"10.1109\/TIFS.2019.2963764","article-title":"Audio steganography based on iterative adversarial attacks against convolutional neural networks","volume":"15","author":"Wu","year":"Apr. 2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3801","DOI":"10.1109\/TIFS.2022.3215901","article-title":"Adaptive QIM with minimum embedding cost for robust video steganography on social networks","volume":"17","author":"Fan","year":"Apr. 2022","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref4","series-title":"Proc. IH&MMSec","first-page":"2282","article-title":"Linguistic steganalysis via densely connected LSTM with feature pyramid","author":"Yang","year":"2020"},{"key":"ref5","first-page":"33","article-title":"Steganography, cryptography, watermarking: A comparative study","volume":"3","author":"Desai","year":"Apr. 2012","journal-title":"J. Glob. Res. Comput. Sci."},{"journal-title":"Technical Report DS-2017-4","year":"2017","author":"Wiseman","key":"ref6"},{"key":"ref7","series-title":"Proc. Int. Conf. Front. Signal Process. (ICFSP)","first-page":"34","article-title":"Application of perfectly undetectable network steganography method for malware hidden communication","author":"Bak","year":"2018"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TIFS.2022.3226909","article-title":"Linguistic steganalysis toward social network","volume":"18","author":"Yang","year":"Apr. 2022","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2736","DOI":"10.1109\/TDSC.2019.2962672","article-title":"Adaptive steganalysis based on statistical model of quantized DCT coefficients for JPEG images","volume":"18","author":"Qiao","year":"Apr. 2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.ins.2021.11.086","article-title":"An effective linguistic steganalysis framework based on hierarchical mutual learning","volume":"586","author":"Xue","year":"2022","journal-title":"Inf. Sci."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1109\/TDSC.2022.3141121","article-title":"A universal audio steganalysis scheme based on multiscale spectrograms and DeepResNet","volume":"20","author":"Ren","year":"Apr. 2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3022","DOI":"10.1109\/TIFS.2022.3196265","article-title":"Universal deep network for steganalysis of color image based on channel representation","volume":"17","author":"Wei","year":"2022","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1109\/TDSC.2021.3132987","article-title":"PixelSteganalysis: Pixel-wise hidden information removal with low visual degradation","volume":"20","author":"Jung","year":"Apr. 2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1016\/j.dcan.2021.09.005","article-title":"Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths","volume":"8","author":"Li","year":"Apr. 2021","journal-title":"Digit. Commun. Netw."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.3724\/SP.J.1016.2009.01247","article-title":"Recent advances in image-based steganalysis research","volume":"32","author":"Shuo","year":"Apr. 2009","journal-title":"Chin. J. Comput."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/TCSVT.2020.2974884","article-title":"Batch steganography via generative network","volume":"31","author":"Zhong","year":"Apr. 2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref17","first-page":"1","article-title":"Introduction to deep learning","volume":"5","author":"Sewak","year":"2021","journal-title":"Adv. Deep Learn. Eng. Sci."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"3787","DOI":"10.1109\/TDSC.2022.3217569","article-title":"Cover reproducible steganography via deep generative models","volume":"20","author":"Chen","year":"Apr. 2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1109\/TIFS.2020.3025438","article-title":"An automatic cost learning framework for image steganography using deep reinforcement learning","volume":"16","author":"Tang","year":"Apr. 2021","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref20","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"22606","article-title":"Large-capacity and flexible video steganography via invertible neural network","author":"Mou","year":"2023"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TIFS.2023.3318939","article-title":"Steganography embedding cost learning with generative multi-adversarial network","volume":"19","author":"Huang","year":"Apr. 2024","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref22","unstructured":"J. Zhu, \u201cPassive defense against 3D adversarial point clouds through the lens of 3D steganalysis,\u201d 2022, arXiv:2205.08738v1."},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.118973","article-title":"Adaptive feature selection for image steganalysis based on classification metrics","volume":"644","author":"Ma","year":"Apr. 2023, Art. no. 118973","journal-title":"Inf. Sci."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"5265","DOI":"10.1109\/TDSC.2023.3243907","article-title":"Extraction method of secret message based on optimal hypothesis test","volume":"20","author":"Du","year":"Apr. 2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3352691","article-title":"Steganographer detection via multi-scale embedding probability estimation","volume":"15","author":"Zhong","year":"Apr. 2020","journal-title":"ACM Trans. Multim. Comput. Commun. Appl."},{"key":"ref26","series-title":"Proc. IEEE Annu. Comput. Softw. Appl. Conf.","first-page":"371","article-title":"A combination of active and passive video steganalysis to fight sensitive data exfiltration through online video","author":"Francis-Christie","year":"2016"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1016\/j.ins.2021.10.023","article-title":"Destroying robust steganography in online social networks","volume":"581","author":"Zhu","year":"Apr. 2021","journal-title":"Inf. Sci."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"3017","DOI":"10.1109\/TCSVT.2022.3224243","article-title":"Image sanitization in online social networks: A general framework for breaking robust information hiding","volume":"33","author":"Zhu","year":"Apr. 2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TCSVT.2019.2891778","article-title":"Diversity-based cascade filters for JPEG steganalysis","volume":"30","author":"Feng","year":"Apr. 2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1007\/s12559-022-10087-3","article-title":"A new approach for JPEG steganalysis with a cognitive evolving ensembler and robust feature selection","volume":"15","author":"Sachnev","year":"Apr. 2023","journal-title":"Cogn. Comput."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"13595","DOI":"10.1007\/s11042-022-13931-8","article-title":"Information theoretic steganalysis of processed image LSB steganography","volume":"82","author":"Chhikara","year":"Apr. 2023","journal-title":"Multim. Tools Appl."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","article-title":"Structural design of convolutional neural networks for steganalysis","volume":"23","author":"Xu","year":"Apr. 2016","journal-title":"IEEE Signal Process. Lett."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","article-title":"Deep learning hierarchical representations for image steganalysis","volume":"12","author":"Ye","year":"2017","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","article-title":"Deep residual network for steganalysis of digital images","volume":"14","author":"Boroumand","year":"Apr. 2019","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref35","series-title":"Proc. Med. Watermarking, Secur., Forensic.","first-page":"83030N","article-title":"Identifying a steganographer in realistic and heterogeneous data sets","author":"Ker","year":"2012"},{"key":"ref36","series-title":"Proc. IH&MMSec","first-page":"45","article-title":"Moving steganography and steganalysis from the laboratory into the real world","author":"Ker","year":"2013"},{"key":"ref37","series-title":"Proc. IEEE Int. Workshop Inform. Forensic. Secur. (WIFS)","first-page":"1","article-title":"Pooled steganalysis in JPEG: How to deal with the spreading strategy","author":"Zakaria","year":"2019"},{"key":"ref38","first-page":"217","article-title":"A review of image steganalysis techniques for digital forensics","volume":"40","author":"Karampidis","year":"Apr. 2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1049\/ipr2.12043","article-title":"Digital image steganalysis: A survey on paradigm shift from machine learning to deep learning-based techniques","volume":"15","author":"Selvaraj","year":"Apr. 2021","journal-title":"IET Image Process"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s11554-019-00915-5","article-title":"Deep learning for real-time image steganalysis: A survey","volume":"17","author":"Ruan","year":"2020","journal-title":"J. Real Time Image Process"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2022.108711","article-title":"The infinite race between steganography and steganalysis in images","volume":"201","author":"Muralidharan","year":"Apr. 2022, Art. no. 108711","journal-title":"Signal Process"},{"key":"ref42","series-title":"Proc. Int. Workshop Inform. Hiding","first-page":"265","article-title":"Batch steganography and pooled steganalysis","author":"Ker","year":"2006"},{"key":"ref43","series-title":"Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)","first-page":"2122","article-title":"Practical strategies for content-adaptive batch steganography and pooled steganalysis","author":"Cogranne","year":"2017"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107920","article-title":"Adversarial batch image steganography against CNN-based pooled steganalysis","volume":"181","author":"Li","year":"Apr. 2021, Art. no. 107920","journal-title":"Signal Process"},{"key":"ref45","series-title":"Proc. ACM SIGMOD Conf. Int. Conf. Manage. Data","first-page":"93","article-title":"LOF: Identifying density-based local outliers","author":"Breunig","year":"2000"},{"key":"ref46","unstructured":"T. Kipf and M. Welling, \u201cSemi-supervised classification with graph convolutional networks,\u201d 2016, arXiv:1609.02907."},{"key":"ref47","doi-asserted-by":"crossref","first-page":"2074","DOI":"10.1109\/TIFS.2019.2891237","article-title":"CNN-based adversarial embedding for image steganography","volume":"14","author":"Tang","year":"Apr. 2019","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref48","doi-asserted-by":"crossref","first-page":"4544","DOI":"10.1109\/TIFS.2021.3109464","article-title":"Efficient JPEG batch steganography using intrinsic energy of image contents","volume":"16","author":"Hu","year":"Apr. 2021","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref49","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/TETCI.2022.3201294","article-title":"Exploring abnormal behavior in swarm: Identify user using adversarial examples","volume":"7","author":"Wang","year":"Apr. 2023","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref50","doi-asserted-by":"crossref","first-page":"8115","DOI":"10.1007\/s11042-017-4706-x","article-title":"Curvelet transform and cover selection for secure steganography","volume":"77","author":"Subhedar","year":"Apr. 2018","journal-title":"Multim. Tools Appl."},{"key":"ref51","series-title":"Proc. Inform. Hiding","article-title":"Break our steganographic system: The ins and outs of organizing boss","author":"Bas","year":"2011"},{"key":"ref52","series-title":"Proc. Secur., Steganograp., Watermarking Multimed. Contents IX","article-title":"The first bows contest: Break our watermarking system","author":"Piva","year":"2007"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"1424","DOI":"10.1109\/TIFS.2014.2336380","article-title":"The steganographer is the outlier: Realistic large-scale steganalysis","volume":"9","author":"Ker","year":"Apr. 2014","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref54","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1109\/TIFS.2015.2496910","article-title":"Steganalysis over large-scale social networks with high-order joint features and clustering ensembles","volume":"11","author":"Li","year":"Apr. 2016","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref55","doi-asserted-by":"crossref","first-page":"8041","DOI":"10.1007\/s11042-018-6582-4","article-title":"Side channel steganalysis: When behavior is considered in steganographer detection","volume":"78","author":"Li","year":"Apr. 2019","journal-title":"Multim. Tools Appl."},{"key":"ref56","doi-asserted-by":"crossref","first-page":"2526","DOI":"10.1109\/TMM.2019.2959909","article-title":"Steganographic security analysis from side channel steganalysis and its complementary attacks","volume":"22","author":"Li","year":"Apr. 2020","journal-title":"IEEE Trans. Multim."},{"key":"ref57","series-title":"Proc. IEEE Int. Conf. Multimed. Expo","first-page":"1","article-title":"Steganographer detection via enhancement-aware graph convolutional network","author":"Zhang","year":"2020"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.neunet.2020.12.026","article-title":"Steganographer detection via a similarity accumulation graph convolutional network","volume":"136","author":"Zhang","year":"Apr. 2021","journal-title":"Neural Netw."},{"key":"ref59","first-page":"137","author":"Russell","year":"2013","journal-title":"Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","article-title":"The MNIST database of handwritten digit images for machine learning research","volume":"29","author":"Li","year":"Apr. 2012","journal-title":"IEEE Signal Process. Mag."},{"key":"ref61","unstructured":"A. Krizhevsky, \u201cLearning multiple layers of features from tiny images,\u201d 2009. Accessed: Aug. 31, 2024. [Online]. Available: https:\/\/www.cs.utoronto.ca\/~kriz\/learning-features-2009-TR.pdf"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"Apr. 2012","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref63","series-title":"Proc. ACM Workshop Inform. Hiding Multimed. Secur.","first-page":"15","article-title":"Steganalysis of adaptive JPEG steganography using 2D Gabor filters","author":"Song","year":"2015"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"4538","DOI":"10.1109\/TMM.2021.3119994","article-title":"Distribution-preserving-based automatic data augmentation for deep image steganalysis","volume":"24","author":"Zhang","year":"Apr. 2022","journal-title":"IEEE Trans. Multim."},{"key":"ref65","series-title":"Proc. Med. Forensic. Secur. III","article-title":"A new paradigm for steganalysis via clustering","author":"Ker","year":"2011"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/TIFS.2008.2002936","article-title":"Multiclass detector of current steganographic methods for JPEG format","volume":"3","author":"Pevny","year":"Apr. 2008","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref67","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.ins.2023.03.085","article-title":"Robust ML model ensembles via riskdriven anti-clustering of training data","volume":"633","author":"Mauri","year":"Apr. 2023","journal-title":"Inf. Sci."},{"key":"ref68","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","article-title":"Content-adaptive steganography by minimizing statistical detectability","volume":"11","author":"Sedighi","year":"Apr. 2016","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref69","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1109\/TIFS.2017.2718480","article-title":"A new rule for cost reassignment in adaptive steganography","volume":"12","author":"Zhou","year":"Apr. 2017","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref70","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1007\/s12083-017-0603-3","article-title":"Efficient steganographer detection over social networks with sampling reconstruction","volume":"11","author":"Li","year":"Apr. 2018","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref71","series-title":"Proc. IEEE Int. Conf. Multimed. Expo","first-page":"235","article-title":"Steganographer detection via deep residual network","author":"Zheng","year":"2017"},{"key":"ref72","series-title":"Proc. IEEE Int. Conf. Parallel Distrib. Syst. (ICPADS)","first-page":"1233","article-title":"Steganalysis via deep residual network","author":"Wu","year":"2016"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.neucom.2016.06.037","article-title":"Iterative multi-order feature alignment for JPEG mismatched steganalysis","volume":"214","author":"Kong","year":"Apr. 2016","journal-title":"Neurocomputing"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TDSC.2022.3154967","article-title":"Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications","volume":"20","author":"Meg\u2019ias","year":"Apr. 2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref75","series-title":"Proc. ACM Int. Conf. Multimed. Retr.","first-page":"300","article-title":"Steganographer detection based on multiclass dilated residual networks","author":"Zheng","year":"2018"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TIFS.2016.2555281","article-title":"Steganalysis features for content-adaptive JPEG steganography","volume":"11","author":"Denemark","year":"Apr. 2016","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref77","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1016\/j.neucom.2019.07.068","article-title":"Content-adaptive selective steganographer detection via embedding probability estimation deep networks","volume":"365","author":"Zheng","year":"Apr. 2019","journal-title":"Neurocomputing"},{"key":"ref78","series-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit.","first-page":"3431","article-title":"Fully convolutional networks for semantic segmentation","author":"Shelhamer","year":"2014"},{"key":"ref79","series-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit.","first-page":"6593","article-title":"Non-local deep features for salient object detection","author":"Luo","year":"2017"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"2953","DOI":"10.1007\/s11063-022-10992-6","article-title":"Deep clustering network for steganographer detection using latent features extracted from a novel convolutional autoencoder","volume":"55","author":"Amrutha","year":"Apr. 2023","journal-title":"Neural Process. Lett."},{"key":"ref81","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1080\/12460125.2018.1460163","article-title":"Approach to the selection of the best cover image for information embedding in JPEG images based on the principles of the optimality","volume":"27","author":"Evsutin","year":"Apr. 2018","journal-title":"J. Decis. Syst."},{"key":"ref82","series-title":"Proc. IEEE Int. Conf. Comput. Inform. Technol. Workshops","first-page":"379","article-title":"Cover selection steganography method based on similarity of image blocks","author":"Sajedi","year":"2008"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"168914","DOI":"10.1109\/ACCESS.2019.2955113","article-title":"Towards improved steganalysis: When cover selection is used in steganography","volume":"7","author":"Wang","year":"Apr. 2019","journal-title":"IEEE Access"},{"key":"ref84","series-title":"Proc. Int. Conf. Image Process.","first-page":"117","article-title":"Cover selection for steganographic embedding","author":"Kharrazi","year":"2006"},{"key":"ref85","first-page":"2328","article-title":"Cover selection for steganography using image similarity","volume":"20","author":"Wang","year":"Apr. 2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref86","series-title":"Proc. Inform. Hiding","first-page":"310","article-title":"Steganalysis of JPEG images: Breaking the F5 algorithm","author":"Fridrich","year":"2002"},{"key":"ref87","series-title":"Proc. Workshop Multimed. Secur.","first-page":"63","article-title":"Calibration revisited","author":"Kodovsky","year":"2009"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","article-title":"Low-complexity features for JPEG steganalysis using undecimated DCT","volume":"10","author":"Holub","year":"Apr. 2015","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref89","series-title":"Proc. Med. Watermarking, Secur., Forensic.","first-page":"259","article-title":"Phase-aware projection model for steganalysis of JPEG images","author":"Holub","year":"2015"},{"key":"ref90","series-title":"Proc. Med. Watermarking, Secur., Forensic.","first-page":"203","article-title":"The challenges of rich features in universal steganalysis","author":"Pevny","year":"2013"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"1954","DOI":"10.1109\/TCSVT.2023.3295364","article-title":"Steganalysis feature selection with multidimensional evaluation & dynamic threshold allocation","volume":"34","author":"Ma","year":"Apr. 2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref92","first-page":"218","article-title":"Steganographer identification of JPEG image based on feature selection and graph convolutional representation","volume":"44","author":"Zhang","year":"Apr. 2023","journal-title":"J. Commun."},{"key":"ref93","unstructured":"H. Wu, \u201cFeature bagging for steganographer identification,\u201d 2018, arXiv:1810.11973."},{"key":"ref94","series-title":"Proc. Knowl. Discov. Data Min.","first-page":"157","article-title":"Feature bagging for outlier detection","author":"Lazarevic","year":"2005"},{"key":"ref95","series-title":"Proc. Wireless Algorithms, Syst., Appl.","first-page":"215","article-title":"MSCNN: Steganographer detection based on multi-scale convolutional neural networks","author":"Yang","year":"2021"},{"key":"ref96","series-title":"Proc. Neural Inform. Process. Syst.","first-page":"84","article-title":"ImageNet classification with deep convolutional neural networks","author":"Krizhevsky","year":"2012"},{"key":"ref97","first-page":"771","article-title":"Steganographer detection via multiple-instance learning graph convolutional networks","volume":"50","author":"Zhong","year":"Apr. 2024","journal-title":"Acta Automatica Sinica"},{"key":"ref98","series-title":"Proc. IEEE Int. Workshop Inform. Forensic. Secur.","first-page":"1","article-title":"Optimizing pooling function for pooled steganalysis","author":"Pevny","year":"2015"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_55735\/TSP_CMC_55735.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:41:45Z","timestamp":1741315305000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":98,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055735","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}