{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:40:43Z","timestamp":1654119643452},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4,1]]},"abstract":"<p>Up to now, most researches on steganalysis concentrate on one extreme case. Typically, the a priori knowledge of the embedding way and cover-media is assumed known in the classifier training and even feature design stage. However, the steganalysis in the real world is done with different levels of such knowledge so that there can be various paradigms for doing it. Although some researchers have addressed the situations, there is still a lack of a systematic approach to defining the various paradigms. In this paper, the authors give such an approach by first defining four extreme paradigms, and then defining the rest among them. Each paradigm is related with two sets of assumed known a priori knowledge respectively about the steganographic algorithm and cover-media, and each paradigm corresponds to a particular case of steganalysis. Also we will see that different paradigms can have very different aims so that the designs may be various.<\/p>","DOI":"10.4018\/ijdcf.2016040101","type":"journal-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T17:35:58Z","timestamp":1461346558000},"page":"1-15","source":"Crossref","is-referenced-by-count":5,"title":["On More Paradigms of Steganalysis"],"prefix":"10.4018","volume":"8","author":[{"given":"Xianfeng","family":"Zhao","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jie","family":"Zhu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Haibo","family":"Yu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"2432","container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=150855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:59:53Z","timestamp":1654117193000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2016040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2016,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2016040101","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,1]]}}}