{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T22:12:54Z","timestamp":1651875174813},"reference-count":32,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10,1]]},"abstract":"<p>Steganalysis relies on steganalytic features and classification techniques. Because of the complexity and different characteristics of cover images, to make steganalysis more applicable toward detecting stego images in real applications, we need to train different classifiers so as to match different images according to their characteristics. Selection of classifiers according to characteristics of images is the key point to improve accuracy of steganalysis. In our work, we study the methods of classifier selection based on characteristics of images including image size, quantization factor, or matrix. Besides, we also discuss other characteristics, such as texture, cover source, which makes an appreciable difference to steganalysis.<\/p>","DOI":"10.4018\/ijdcf.2017100101","type":"journal-article","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T15:54:40Z","timestamp":1502812480000},"page":"1-14","source":"Crossref","is-referenced-by-count":2,"title":["A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics"],"prefix":"10.4018","volume":"9","author":[{"given":"Jie","family":"Zhu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Qingxiao","family":"Guan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yun","family":"Cao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Gong","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2017100101-0","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495494"},{"key":"IJDCF.2017100101-1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"issue":"Aug","key":"IJDCF.2017100101-2","first-page":"1871","article-title":"LIBLINEAR: A library for large linear classification.","volume":"9","author":"R. E.Fan","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"IJDCF.2017100101-3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"IJDCF.2017100101-4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2235832"},{"key":"IJDCF.2017100101-5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"IJDCF.2017100101-6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_7"},{"key":"IJDCF.2017100101-7","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288872"},{"key":"IJDCF.2017100101-8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"IJDCF.2017100101-9","doi-asserted-by":"crossref","first-page":"607201","DOI":"10.1117\/12.643254","article-title":"New blind steganalysis and its implications","author":"M.Goljan","year":"2006","journal-title":"Electronic Imaging 2006"},{"key":"IJDCF.2017100101-10","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412644"},{"key":"IJDCF.2017100101-11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2364918"},{"key":"IJDCF.2017100101-12","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J., & Denemark, T. (2014). Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security, 2014(1), 1.","DOI":"10.1186\/1687-417X-2014-1"},{"key":"IJDCF.2017100101-13","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482965"},{"key":"IJDCF.2017100101-14","doi-asserted-by":"crossref","unstructured":"Ker, A. D., & Pevn\u00fd, T. (2014, February). A mishmash of methods for mitigating the model mismatch mess. In IS&T\/SPIE Electronic Imaging (pp. 90280I-90280I). International Society for Optics and Photonics.","DOI":"10.1117\/12.2038908"},{"key":"IJDCF.2017100101-15","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411349"},{"key":"IJDCF.2017100101-16","doi-asserted-by":"crossref","unstructured":"Kim, Y., Duric, Z., & Richards, D. (2006, July). Modified matrix encoding technique for minimal distortion steganography. Proceedings of theInternational Workshop on Information Hiding (pp. 314-327). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-74124-4_21"},{"key":"IJDCF.2017100101-17","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597830"},{"key":"IJDCF.2017100101-18","doi-asserted-by":"publisher","DOI":"10.1117\/12.907495"},{"key":"IJDCF.2017100101-19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638179"},{"key":"IJDCF.2017100101-20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"IJDCF.2017100101-21","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., Sedighi, V., & Fridrich, J. (2014, February). Study of cover source mismatch in steganalysis and ways to mitigate its impact. In IS&T\/SPIE Electronic Imaging (pp. 90280J-90280J). International Society for Optics and Photonics.","DOI":"10.1117\/12.2039693"},{"key":"IJDCF.2017100101-22","unstructured":"Latham, A. (1999, August). JPHS software. Retrieved September 18, 2016, from http:\/\/linux01.gwdg.de\/*alatham\/ stego.html"},{"key":"IJDCF.2017100101-23","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361410"},{"key":"IJDCF.2017100101-24","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"IJDCF.2017100101-25","doi-asserted-by":"publisher","DOI":"10.1117\/12.696774"},{"key":"IJDCF.2017100101-26","doi-asserted-by":"crossref","unstructured":"Pevny T., Fridrich, J. (2008). Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on information forensics and security, 3(2), 247-258.","DOI":"10.1109\/TIFS.2008.922456"},{"key":"IJDCF.2017100101-27","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467805001719"},{"key":"IJDCF.2017100101-28","doi-asserted-by":"crossref","unstructured":"Shi, Y. Q., Sutthiwan, P., & Chen, L. (2012, May). Textural features for steganalysis. Proceedings of theInternational Workshop on Information Hiding (pp. 63-77). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-36373-3_5"},{"key":"IJDCF.2017100101-29","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756608"},{"key":"IJDCF.2017100101-30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_21"},{"key":"IJDCF.2017100101-31","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2016040101"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=188358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T21:54:47Z","timestamp":1651874087000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2017100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2017100101","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,1]]}}}